Our website uses cookies to enhance your browsing experience.
Accept
to the top
>
>
Guest

Posts: Guest

Aug 30 2022
The concept of smart pointer static_ptr<T> in C++
Guest
We have several smart pointers in C++ – 'std::unique_ptr', 'std::shared_ptr', 'std::weak_ptr'.
...
Aug 23 2022
How I searched for viruses in a program
Guest
This idea of this article came to my mind after one discussion in a Telegram chat. Someone posted a program for changing the file's MD5 hash. Another chat participant checked this program...
...
Subscribe to the newsletter
Want to receive a monthly digest of the most interesting articles and news? Subscribe!
Jul 18 2022
Relocation: QMake -> CMake
Guest
On our way there, we'll walk along the Cross Compilers Street, sit in the Build System Square, and have a drink at the Dependency Management Bar. We'll also visit those who use Qt in embedded...
...
Jun 21 2022
How to write reflection for C++
Guest
C++ is a truly controversial language. Good ol' C was created in 1972. C++ appeared in 1985 and had backward compatibility with C. Since then, C++ was pronounced dead many times: Java did it...
...
Jun 07 2022
"Google" programmers. How one idiot hired a couple more idiots
Guest
A long time ago, I performed technical interviews on a regular basis — I was recruiting candidates for the position of a programmer in a company. I had a simple, clear, and smart recruitment plan...
...
Jun 03 2022
Embedded system developers do not know how to program
Guest
Nowadays system resources are widely available. Ordinary high-level application software developers have to follow minimum system requirements. So, don't expect them to optimize the code to...
...
Jun 01 2022
Things to keep in mind when working with POSIX signals
Guest
Like any other tool, POSIX signals have their own rules on how to use them wisely, securely, and safely. Programming language standards, man pages and the POSIX standard itself have described...
...
May 12 2022
How to spot C and C++ developers by their code
Guest
We happen to write code for IoT stuff related to electricity, like car charging stations. Since hardware resources are usually sufficient, our main goal is not to save on every byte possible...
...
May 06 2022
Debug output on microcontrollers: how Concepts and Ranges put my printf to rest
Guest
Hello! My name is Alexander and I work as a microcontroller...
...
Trojan Source: Invisible Vulnerabilities
Guest
We present a new type of attack in which source code is maliciously encoded so that it appears different to a compiler and to the human eye. This attack exploits subtleties in text-encoding...
...
View more Pagination arrow previous
Showing: - of 26