www.frostsnow.net
Please present proof of COVID-19 vaccination as an X.509v3 extension in your client certificate in order to access this site. Thank you!
I am offerring GNU/Linux tutoring to those who may be interested. See this flyer (not currently advertising) for details. Here are some cool examples below:
Minetest is a voxel game engine (and game) like Minecraft, except that Minetest is Free Software, thus you have the right to modify the code and redistribute copies to your friends and family.
The game world itself is generated using Perlin Noise. Modifying the noise parameters can result in some very interesting maps. For example, dramatically increasing the size of caves results in:
It is also possible to create mountains thousands of blocks tall, or large rivers with only a few pockets of land in-between them.
The most powerful aspect of Minetest is its modding API (Application Programming Interface). This allows virtually unlimited customization of the game. A simple example is the farming_plus mod, which adds extra farmable plants, trees, and a scarecrow:
I modified the strawberry plant textures to make them look more like strawberry plants, although I was told that it now somewhat resembles broccoli.
Learning Minetest is a great way to play, code, and share freely!
LATEXis a document-preparation system, like that other word-processor, but far superior for complex documents and mathematical typesetting. This is an example of a recursion tree which I typeset in LATEX:
...this is the algorithmic complexity approximation derived from the recurrence tree:
...but this is just eye candy (or perhaps horrors from the abyss if you find math intimidating), what I cannot show you here is how much easier it is to construct references, tables of contents, indices, &c.
The firearms of cyberspace: cryptography. GPG is a software tool which allows users to make use of crytpography and send secure, encrypted messages to each other, thus protecting against eavesdropping. Below is an example of a message encrypted with the password "password", which I can teach you how to decrypt:
-----BEGIN PGP MESSAGE-----
jA0EBwMCoA8RdMu6/AXC0nEBvudCVg9Sx/ErwvpK9C3OHj3bFKNy9Hg41eBFcZyg
ayyCB6lp6T5T4snj14j6qS89Rrqh3ljdrtXGRbviSH9Xoje6UrqC9Q6ejDDOuOFv
rxisUgkpCDWl4D494awiYuuksA34zMyfTQ13mPyx7Zodbg==
=/Lg2
-----END PGP MESSAGE-----
Note that because the password is published here (and it is a weak password), this particular message is not actually secure.
This
is a visualization of a 1,000-element Merge Sort
which I generated using graphviz. Note how the elements go from unsorted at the top to sorted at the bottom. WARNING: This is a large image and may crash unstable image viewers or systems with little RAM.
Generated using LaTeX2html: Source