Source: https://habr.com/ru/post/11228/More articles:Concept of a Trojan that recognizes voice and tones from a smartphoneHTML5 Canvas - creating arcade scrolling step by stepSpring is coming and CodeFest with herThe consequences of using Copy-Paste technology when programming in C ++ and how to deal with itTest drive templates. Free for 30 daysHow to make a successful career at IBM headquarters?FileSystem API & File API: we understand and useUnity3D for beginners - Tutorial 1Digital signatures in executable files and circumvention of this protection in malwareOriental manuscripts digitizeAll Articles