obfuscation

  • 101Perl — This article is about the programming language. For other uses, see Perl (disambiguation). Perl Paradig …

    Wikipedia

  • 102Peppered moth — Taxobox name = Peppered moth status = NE status system = IUCN3.1 image caption = Biston betularia betularia Verify source|date=July 2007 morpha typica image width = 240px regnum = Animalia phylum = Arthropoda classis = Insecta ordo = Lepidoptera… …

    Wikipedia

  • 103Romantic music — Periods of Western art music Early Medieval   (500–1400) Renaissance (1400–1600) Baroque (1600–1760) Common practice Baroque (1600–1760) …

    Wikipedia

  • 104Source code — For the 2011 film, see Source Code. Not to be confused with source coding. An illustration of Java source code with prologue comments indicated in red, inline comments indicated in green, and program code indicated in blue In computer science,… …

    Wikipedia

  • 105Self-reference — The Treachery Of Images (1928 29) by René Magritte depicts a pipe along with text stating This is not a pipe. Note: This image is an illustration of a self reference case only if the demonstrative pronoun ceci ( this ) refers not to the idea of a …

    Wikipedia

  • 106Software cracking — is the modification of software to remove or disable features which are considered undesirable by the person cracking the software, usually related to protection methods: copy protection, trial/demo version, serial number, hardware key, date… …

    Wikipedia

  • 107International Obfuscated C Code Contest — The International Obfuscated C Code Contest (abbreviated IOCCC) was a programming contest for the most creatively obfuscated C code, held annually between 1984 and 1996, and thereafter in 1998, 2000, 2001, 2004, and 2006.[1] The winners of the… …

    Wikipedia

  • 108Vladimir Putin — This name uses Eastern Slavic naming customs; the patronymic is Vladimirovich and the family name is Putin. Vladimir Putin Владимир Путин …

    Wikipedia

  • 109Cyclic redundancy check — A cyclic redundancy check (CRC) is an error detecting code designed to detect accidental changes to raw computer data, and is commonly used in digital networks and storage devices such as hard disk drives. Blocks of data entering these systems… …

    Wikipedia

  • 110ROT13 — replaces each letter by its partner 13 characters further along the alphabet. For example, HELLO becomes URYYB (or, rev …

    Wikipedia