Search results for Introduction to Free Pascal 2.0
 |
|
Post date: May 16, 2005, 23:05
Category: Programming
Views: 3500
Comments
|
Tutorial quote: After five years of development, Free Pascal 2.0 is ready. With the new compiler, its authors believe they are ready to become a larger open source development platform. In the MS-DOS world, Pascal was one of the major programming languages and is by means of Borland Delphi an important programming language in the Windows world. In the open source world, Free Pascal is the leading Pascal compiler and while open source is a bit biased using the C language, the Pascal language has a lot to offer to open source programmers. |
 |
|
Post date: April 17, 2005, 09:04
Category: Programming
Views: 3403
Comments
|
Tutorial quote: Ok, first part is going to be fairly boring, but put up with it. Im just going to go through a few reasons why you should choose Python as a language to learn. First off it free!, there is no cost involved in gettin Python, although there is a license, but this is just a standard license that goes with all free and open source software. Python is an open source language, as is the interpreter (Python is written in C). |
 |
|
Post date: April 12, 2005, 16:04
Category: Miscellaneous
Views: 2946
Comments
|
Tutorial quote: This newbie-level Linux tutorial is an introduction to handling files from the Linux command line. It will cover finding files, determining their type, renaming, copying, examining their attributes, reading their contents, and, in the case of binary files, how to get clues to learn something more about them. Further reading will be suggested for editing files since that topic is beyond the scope of this article. |
 |
|
Post date: March 21, 2006, 19:03
Category: Security
Views: 3386
Comments
|
Tutorial quote: GNU Privacy Guard, or GPG, is a free replacement for the famous encryption tool PGP written by Phil Zimmermann. It is a tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. Here we'll provide a quick introduction to generating a key-pair and using it for basic tasks. |
 |
|
Post date: March 20, 2006, 20:03
Category: Software
Views: 3372
Comments
|
Tutorial quote: Today I started to set up a SVN repository for our final year project. I tried to setup a SVN server using Apache2 so that the SVN repository is available to the client through the WebDAV/DeltaV protocol. Read on for a trial-and-error introduction.
The Version Control with Subversion book (by Ben Collins-Sussman, Brian W. Fitzpatrick & C. Michael Pilato) was very useful to me when I struggled with SVN. The e-version of the book also available for free. |
 |
|
Post date: July 3, 2007, 06:07
Category: Programming
Views: 4839
Comments
|
Tutorial quote: This tutorial covers the basics of PHP in an easy to understand fashion. Well categorized topics and illustrations.
|
 |
|
Post date: October 22, 2006, 02:10
Category: System
Views: 7107
Comments
|
Tutorial quote: Answers to frequently asked questions about using Unix-level commands on OS X. Serves as a relatively gentle introduction to the command-line interface for novices. |
 |
|
Post date: February 12, 2006, 07:02
Category: Network
Views: 4872
Comments
|
Tutorial quote: With the introduction of the Apache2 packages in Debian it is much simpler to create and use a secure SSL protected webserver than in the old days with Apache 1.3, here we'll show how it is done. |
 |
|
Post date: September 20, 2006, 22:09
Category: Network
Views: 7776
Comments
|
Tutorial quote: This is the second part of the introduction to FireHOL article. It covers more advanced topics that you might find useful, such as defining new services, selective filtering, and NAT. Everything is explained in a very detailed fashion. |
 |
|
Post date: February 6, 2006, 09:02
Category: Security
Views: 3802
Comments
|
Tutorial quote: Videochatting and amateur pornography are all well and good, but have you ever wondered what else you can do with that webcam?
Well, thanks to the efforts of many dedicated open-source coders, any half-decent PC can be turned into a motion-detecting, snapshot-making, video-recording D.I.Y. security solution. |
|
|