no panic muscle

Protected: git

There is no excerpt because this is a protected post.

Protected: nmap

There is no excerpt because this is a protected post.

do-droplets-table

how droplets ssh clients generally authenticate ? 1- using passwords (which are less secure and not recommended) 2- SSH keys (which are very secure and strongly

books – tree

books||—-you don’t know js      |—-introduction     |—-Preface     |—-Foreword     |—-up & going          |—-intro programming          |—-intro

chrome extension

mkdir real` without` keyboard` browsing cd ‘.\reactNative fullstack\’ ni popup.html ni popup.js ni manifest.json vim manifest.json ______________________________________________________________ // put a manifest like this: { “manifest_version”:

tree

codecademy||—-Learn C# (LINK)     |—-Hello World          |—-Hello World          |—-Project: Console Creatures          |—-Article: Go

Learn C#

course link here https://docs.microsoft.com/en-us/dotnet Stack Overflow website were built with frameworks that can be run with C# (Unity and ASP.NET, respectively) using System; namespace GettingInput {

bazar-tike

قرمت می کنم جواب منو از پهنا نده لات کوچه خلوت صداتو الکی کلفت نکن پشت تلفن غورباقه هفتیر میکشه مفت بری نکن ما خودمون

abbr

git abbr definition scm source code management                                    

tinyMCE

// get the content of tinyMCEed textarea and put it into previewText to send by myself let mainTextarea = $(this).prevAll(“textarea”); let mainTextareaID = $(mainTextarea).attr(‘id’); tinyMCE.get(mainTextareaID).focus();

Protected: cli

There is no excerpt because this is a protected post.

mehdiEnglish – grammar

Examples Grammar Explanation infinite:i have considered all of the evidence that you have presentedgerund:having considered all of the evidence that you have presented ما دو

english

persian things that you want to say how do we say it hello and thanks a lot because of the time and the  oppotunity you

python – Charles Severance

a typical processor is designed to ask the “what should i do?” 3,000,000,000 times per second 32 or 64 pins the back of a cpu

Useful websites for programmers

When learning CS, there are some useful sites you must know to get always informed to do your technologies even better and learn new things.

how to start hacking?

I’d like to learn how to hack, how do I start? This question has been asked and answered many times. We’ll summarize the opinion of

restarting modem with CLI

در این مقاله کوتاه نحوه Reboot کردن مودم های UTEL از طریق خط فرمان را بررسی کرده ایم. برای اینکار ما یک اسکریپت ساده با

file transformation with LAN

اتصال دو کامپیوتر به یک دیگر از طریق کابل 1- یک طرف کابل LAN را به کامپیوتر اول و طرف دوم آن را به کامپیوتر

cpu – ram – …

در پردازنده های رده بالا ، amd ارزش خودش رو به intel نشون داده برای گیمینگ و کار های 3D باید از کارت های گرافیک

MehdiEnglish – dictionary

persian things that you want to say how do we say it هزار تومن 75 75 tomans 3 میلیون 3 million صد درصد 100 percent

dic

word definition control flow “control flow” means same “if/else” or “conditions” REPL REPL is an abbreviation for read–eval–print loop. It’s a program that loops, or repeatedly cycles, through three

intro, HTML, CSS, js

تایپوگرافی فونت serif (که تو غار ها می نوشتند، واسه همین گوشه داره) هرچی مثلا در حرف O بین قسمت باریک و کلفت آن فاصله

do-droplets-table

how droplets ssh clients generally authenticate ? 1- using passwords (which are less secure and not recommended) 2- SSH keys (which are very secure and strongly

Read More »