Detect Corruption with a Checksum
12:45
Sockets and Pipes Look Like Files (Unix/fdopen)
21:38
Pulling Back the Curtain on the Heap
28:21
Sağlama toplamı ve Hamming mesafe
14:08
Is memcpy dangerous?
24:25
Making a calculator from scratch - #SoME3
10:43
Monolithic vs Microservice Architecture: Which To Use and When?
13:59
How to Write Function-Like Preprocessor Macros (C example)
1:48:36