Recently Updated Pages
Introduction to Course 6
Security attacks are on the rise, and new vulnerabilities are exploited and discovered ever...
Xkhanku desert (from the dragons side)
who is: nnzakeh
Character Name: Nnzakeh Race: (Kurozma Dragon) Age: (23?) Very young for Kurozma dragons. Clas...
dungeon mastering for chatgpt is a nightmare if u rnt ready for it
imagine you are and adventurere in a bar drinking a glass of cyder, you are new to this town ...
Counting in kuroik
In the Kuroik language, counting is done in a hexadecimal system, which means it uses base 16 ins...
Flaming Feathers v2? or v1 idk
The Sandbird (Sandavis desertus), also known as the "Flaming Feathers," is a species of reptile t...
Xkhanku desert
In the desert of Xkhanku, on the land of Taurosia, there resides an ecosystem both cruel and sing...
Page 1
We are born from the blood of a draconic god, an 8 headed dragon, Nykveru god of ××××× was the gu...
html+css+java 3rd site resources for coursera project page
Working Off-Platform Getting Started: To work on this project, you will need an IDE or text edi...
code for the home page
<div class="image-container"> <div class="socials"> <h2><a title="My Discord Server" hr...
splines plugin code default
using System; using System.Collections.Generic; using System.Linq; using Unity.Collections; u...
Preface
HI! im the owner of this site, I'm going to drop things that aren't related my my game idea here!
the dream, a western
I reckon I dozed off for a good two hours and found myself in the wildest dream, somethin' I'd ne...
Kuroik blood
I have something bugging me. And it's why not everything can use magic. Especially the invading h...
Components of network layer communication
Components of network layer communication In the reading about the OSI model, you learned about ...
The OSI model
So far in this section of the course, you learned about the components of a network, network devi...
Learn more about the TCP/IP model
In this reading, you will build on what you have learned about the Transmission Control Protocol/...
1.1.4 Threat Actors
Before you can understand how an ethical hacker or penetration tester can mim...
1.1.3 Lab - Researching PenTesting Careers
Protego Security Solutions I think i...
1.1.1 Overview
1.1.1 Overview ...