PinnedAudrey's weBlog & reViews50% Off Amazon Promo Codes [discount coupons, updates daily] Shop at Half Price!This post is specifically devoted to a collection of active (ongoing) Amazon Promo Codes. The discount code will be conveniently applied…May 14May 14
PinnedAudrey's weBlog & reViewsWelcome to My Humble Affiliate StorefrontHi everyone, I really appreciate your visit! Enjoy shopping here. I gratefully earn commissions at no extra cost to you when you shop…Jun 11Jun 11
Audrey's weBlog & reViewsThe Langoliers (horror miniseries) and No Highway in the Sky (old aviation film)Watch for free on YouTube14h ago14h ago
Audrey's weBlog & reViewsOrganizing Medium Follower List in Alphabetical Order Using PythonA simple Python code consisting only of a few lines can order your followers on Medium alphabetically, and save the list to the text file.2d ago12d ago1
Audrey's weBlog & reViewsStart Coding with Python: 5. Dictionaries (part III — nesting)Nesting is by definition storing dictionaries in a list, or a list of items as a value in a dictionary, or even a dictionary inside…3d ago13d ago1
Audrey's weBlog & reViewsStart Coding with Python: 5. Dictionaries (part II — looping)We will learn how to loop through a dictionary. Since a dictionary can store information in numerous different ways, there also exist many…4d ago14d ago1
Audrey's weBlog & reViewsStart Coding with Python: 5. Dictionaries (part I — creating & modifying)One can use a dictionary in Python to connect related information in it. It is convenient to store, access and modify the information in…5d ago15d ago1
Audrey's weBlog & reViewsUncanny Mystery of Robert F. Kennedy’s Assassination in 1968Eerie coincidences surrounding the historical killing that might ultimately have changed the course of modern international politicsJul 41Jul 41
Audrey's weBlog & reViewsWhat Charge Did Julian Assange Plead Guilty To?This post does not present any personal point of view on the case.Jun 29Jun 29
Audrey's weBlog & reViewsinOSINT TEAMLearning Networks with Linux: Wi-Fi Hacking without Forced DeauthenticationUp until now, we have only discussed hacking methods that rely on forcing the clients to reconnect to the target Wi-Fi in order to capture…Jun 291Jun 291