6/27/2012

After unsigned long long Pause

Hi everyone. After about six months I am (not) finally back. My pace of life killed my writing schedule, my mind was pretty much blown away and I forgot about this blog, and my original blog, and social networks and everything. So, I all of a sudden stopped by here and saw an unpublished comment on my HackerTyper 1 post. It was from February :'(

I answered that comment, but I am not sure if Mike will see it. Anyway, now I plan to get back to work on this blog. This post is about my extremely long pause and comeback.

1/11/2012

NCC Tutorial: Pointers Exercise

As usual, theoretical knowledge on some subject is nothing if you don't know how to apply it to some practical problem. So, in this post we will try to summarize and combine all the stuff we learned in this tutorial.

1/10/2012

NCC Tutorial: Pointers 4

In NCC Tutorial: Pointers 3, we learned that the arrays are pointer equivalents. Now we will see why the pointers are useful in function calls.

1/07/2012

NCC Tutorial: Pointers 3

In NCC Tutorial: Pointers 2, we used pointers to directly access some variables in memory. That does not make much sense when we use them inside the main function, but will become clearer next time when we are going to use pointers as function arguments. Meanwhile, let's see why pointers are important for arrays.

1/04/2012

NCC Tutorial: Pointers 2

In NCC Tutorial: Pointers 1, I introduced * and & operators to you. In this one, I'll try to explain them through an example, so you get to know them better.

1/03/2012

NCC Tutorial: Pointers 1

This is my first language tutorial ever, and I hope it will be helpful. I chose to write about pointers first, because that's the way everything works. The pointers are The Thing in C language. If you get comfortable using them, you will be able to really love C. Otherwise, you'll probably hate it. So, let's start with the first tutorial here.

11/22/2011

Crypto-tools: Printing Ciphertext in Chunks

Now that we have generated ciphertext, it looks pretty much like a bunch of random characters which is not easily readable. That's why it's common practice for ciphertext to be wrote grouped into small chunks of 3, 4, 5 or more characters. The function we will write now is made to do exactly that.