Skip to content
View rchytas's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report rchytas

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. Altar Altar Public

    Always first project in a new development environment (some mundane stuff for now)

    Java 1

  2. Python-Flask-App Python-Flask-App Public

    A simple Python Flask REST API

    Python 1

  3. Spring-Boot-Neo4j-Example Spring-Boot-Neo4j-Example Public

    Drug-Condition Graph Project

    Java

  4. Jupyter-Notebook-Treasure Jupyter-Notebook-Treasure Public

    Example Jupyter Notebooks for ML Projects

    Jupyter Notebook

  5. Top 25 Most Dangerous Software Errors Top 25 Most Dangerous Software Errors
    1
    #### Top 25 Most Dangerous Software Errors
    2
    
                  
    3
    #### A list of the most dangerous programming errors and how to fix them:
    4
    
                  
    5
    ##### List is Made by : CERT, Purdue University University of California, KRvW Associates, Information-Technology Promotion Agency (Japan), Cigital Inc., Symantec Corporation MITRE, Aspect Security, Secunia, iDefense Labs at VeriSign, Inc., MANDIANT, Microsoft, Oracle Corporation, Red Hat Inc., Fortify Software, Hatha Systems, Northern Kentucky University, ThinkSec, Veracode, Inc., Breach Security, New Access SA, (Switzerland), Missing Link Security Inc., Tata Consultancy Services (TCS), Secured Sciences Group, LLC, RSA, Apple Product Security, Software Assurance Forum for Excellence in Code (SAFECode), Core Security Technologies Inc., Depository Trust & Clearing Corporation (DTCC),  National Security Agency (NSA) Information Assurance Division, Department of Homeland Security (DHS) National Cyber Security Division
  6. JMeter Quick Reference JMeter Quick Reference
    1
    ### JMeter Quick Reference
    2
    
                  
    3
    #### Samplers: Samplers tell JMeter to send a request to a server and wait for a response. Following is the list of JMeter Samplers:
    4
    
                  
    5
    	FTP Request