Darkstat is a network traffic monitoring tool. It captures network traffic and calculates statistics. Darkstat provides web interface to view traffic graphs and reports.
This tutorial demonstrates how to install...
Ninja is a build system that enables to build binaries from source code. Ninja might be used as alternative to the Make. Ninja is focused on speed. To achieve high...
Celsius and Fahrenheit are two scales for temperature measurement. Sometimes we might need to perform temperature conversion from Fahrenheit to Celsius. A table includes a links to posts with examples...
FFmpeg is an open-source collection of tools for processing video and audio files. It allows to convert video and audio files from one format into another, resize videos, stream audio...
Celsius and Fahrenheit are two scales for temperature measurement. Sometimes we might need to perform temperature conversion from Celsius to Fahrenheit. A table includes a links to posts with examples...
There might be cases where you want to determine if unwanted users not using your wireless network or to find all devices connected to your network. Nmap is one of...
RSA is an asymmetric cryptography algorithm. Asymmetric means that two keys are used: private key and public key. These keys can be encoded and stored using various formats. A table...
RSA is an asymmetric cryptography algorithm. Asymmetric means that two keys are used: private key and public key. These keys can be encoded and stored using various formats. A table...
BLAKE2 is a cryptographic hash function based on BLAKE. BLAKE2b is a variant of BLAKE2, which is optimized for the usage with 64-bit platforms. A table includes a links to...
Image thresholding is a technique that allows to perform image binarization based on pixel values. Usually, if the pixel value is greater than a threshold, it is set to a...