26255
Securing your users' authentication - Stavros' Stuff
If you’re wondering why SMS-based auth is not on the list above, it’s because SMS is how you lose users’ accounts. For every time you have implemented SMS-based two-factor authentication, you need to quit one job. Do not use/implement/touch SMS-based auth, it is less secure than no two-factor auth.
security  webdev  mobile  design 
19 hours ago
Using /proc to get a process' current stack trace | OpsTips
Check out how you can use the proc filesystem to retrieve the kernel stack trace of a given process

The file covered in this article, /proc/<pid>/stack, is the one that motivated me to learn more about /proc and get The Month of Proc.

It’s such a useful thing when you’re unaware of what is the state of a given process. Meanwhile, I’ve noticed that it’s not very well known by people getting started with Linux.
debugging  linux  tools  performance  programming  sysadmin  profdev 
2 days ago
COUNTY OF KAUA’I - Generic Tax Sale Inst_rev 08DEC2017.pdf
COUNTY OF KAUA'I PROPOSED FORECLOSURE SALE OF REAL PROPERTY - Date: May 2019 (Tentative)
realestate  hawaii  taxsales  pdf 
3 days ago
Announcing Camelot, a Python Library to Extract Tabular Data from PDFs - SocialCops
Today, we’re pleased to announce the release of Camelot, a Python library and command-line tool that makes it easy for anyone to extract data tables trapped inside PDF files!
pdf  python  scraping  opensource  libraries 
5 days ago
The Illustrated TLS Connection: Every Byte Explained
In this demonstration a client has connection to a server, negotiated a TLS 1.2 session, sent "ping", received "pong", and then terminated the session. Click below to begin exploring.
networking  ssl  profdev  security  webdev 
5 days ago
Asterisks in Python: what they are and how to use them - Trey Hunner
There are a lot of places you’ll see * and ** used in Python. These two operators can be a bit mysterious at times, both for brand new programmers and for folks moving from many other programming languages which may not have completely equivalent operators. I’d like to discuss what those operators are and the many ways they’re used.
programming  python 
6 days ago
Boltons: A set of BSD-licensed, pure-Python utilities | Hacker News
Toolz is really a game changer since it allows you to write elegant functional code (lazy evaluations, currying, pipes, parallelism) in Python which feels native.
python  opensource  libraries  programming  functionalprogramming  utilities 
8 days ago
Computer Networking — CNP3www 2014 documentation
Computer Networking : Principles, Protocols and Practice is an open-source ebook that explains the main principles of Computer Networking and the key protocols that are used on the Internet. The ebook is intended to be used for an upper-level undergraduate networking course. The first part describes the theoretical foundations of this domain as well and the main algorithms and protocols. The second part contains a detailed explanation of the main Internet protocols including HTTP, DNS, TCP, UDP, IPv6, BGP, RIP, OSPF, Ethernet and WiFi. The last part contains exercises and practical labs to allow the students to test their knowledge.
books  networking  reference  sysadmin  profdev  opensource 
8 days ago
Counting calories: Get back to weight-loss basics - Mayo Clinic
Your weight is a balancing act, but the equation is simple: If you eat more calories than you burn, you gain weight. And if you eat fewer calories and burn more calories through physical activity, you lose weight.

Because 3,500 calories equals about 1 pound (0.45 kilogram) of fat, it's estimated that you need to burn about 3,500 calories to lose 1 pound.

So, in general, if you cut about 500 to 1,000 calories a day from your typical diet, you'd lose about 1 to 2 pounds a week.

It sounds simple. However, it's more complex because when you lose weight, you usually lose a combination of fat, lean tissue and water. Also, because of changes that occur in the body as a result of weight loss, you may need to decrease calories further to continue weight loss.
fitness  health 
9 days ago
Basal Metabolic Rate (BMR) and Daily Calorie Needs - Calculator Online (Harris-Benedict equation)
Calculate Basal Metabolic Rate (BMR) online (Harris Benedict Equation)
Your Basal Metabolic Rate (BMR is the amount of calories you would burn if you were asleep all day. The Harris Benedict Equation determines your total daily energy expenditure (calories).

The BMR formula uses the variables of height, weight, age and gender to calculate the Basal Metabolic Rate (BMR). This tool then uses the Harris Benedict Equation to determine your total daily energy expenditure (calories). The Harris Benedict Equation is a formula that uses your BMR and then applies an activity factor.
fitness  tools  health 
9 days ago
How to build your own Neural Network from scratch in Python
A beginner’s guide to understanding the inner workings of Deep Learning
python  ai  datascience  machinelearning 
12 days ago
Don’t sign a CLA | Drew DeVault’s Blog
A large minority of open-source projects come with a CLA, or Contributor License Agreement, and require you to sign one before they’ll merge your patch. These agreements typically ask you to go above and beyond the rights you afford the project by contributing under the license the software is distributed with. And you should never sign one.

Free and open source software licenses grant explicit freedoms to three groups: the maintainers, the users, and the contributors. An important freedom is the freedom to make changes to the software and to distribute these changes to the public. The natural place to do so is by contributing to the upstream project, something a project should be thankful for. A CLA replaces this gratitude with an attempt to weaken these freedoms in a manner which may stand up to the letter of the license, but is far from the spirit.

A CLA is a kick in the groin to a contributor’s good-faith contribution to the project. Many people, myself included, contribute to open source projects under the assumption that my contributions will help serve a project which continues to be open source in perpetuity, and a CLA provides a means for the project maintainers to circumvent that. What the CLA is actually used for is to give the project maintainers the ability to relicense your work under a more restrictive software license, up to and including making it entirely closed source.
opensource  legal 
12 days ago
Removing EXIF Data With ImageMagick
The easiest way is to remove EXIF data is to download ImageMagick and use the mogrify command line tool:

mogrify -strip image.jpg

mogrify -strip /example/directory/*
graphics  utilities  tools 
13 days ago
ExifTool by Phil Harvey
ExifTool is a platform-independent Perl library plus a command-line application for reading, writing and editing meta information in a wide variety of files. ExifTool supports many different metadata formats including EXIF, GPS, IPTC, XMP, JFIF, GeoTIFF, ICC Profile, Photoshop IRB, FlashPix, AFCP and ID3, as well as the maker notes of many digital cameras by Canon, Casio, DJI, FLIR, FujiFilm, GE, GoPro, HP, JVC/Victor, Kodak, Leaf, Minolta/Konica-Minolta, Motorola, Nikon, Nintendo, Olympus/Epson, Panasonic/Leica, Pentax/Asahi, Phase One, Reconyx, Ricoh, Samsung, Sanyo, Sigma/Foveon and Sony.

ExifTool is also available as a stand-alone Windows executable and a MacOS package: (Note that these versions contain the executable only, and do not include the HTML documentation or other files of the full distribution above.)
graphics  opensource  tools  utilities 
13 days ago
Does an IQ Test Make You an Authentic Genius?
In studies of children and historical figures, IQ falls short as a measure of success.
psychology  research  motivational 
13 days ago
Sans Forgetica
Sans Forgetica is a font designed using the principles of cognitive psychology to help you to better remember your study notes.

It was created by a multidisciplinary team of designers and behavioural scientists from RMIT University.

Sans Forgetica is compatible with both PC and Mac operating systems. Download it for free today, or keep scrolling to learn more about how it was made.
design  science  fonts  research  education  opensource 
13 days ago
« earlier      
activism ai algorithms amazon analytics android angular animals apis apple art assembly audio backups bigdata biology bitcoin blogs books c c++ california cars china chrome clojure cloud coffee color consulting copyright creditcards crime cryptography css databases datascience debugging demographics design diy django drm drugs ecommerce economics education electrical email employment encryption energy england environmental europe extensions facebook filesharing finance finances firefox fitness fonts food fun functionalprogramming games gender git github go google government graphics hackernews handyman hardware haskell health history hosting howto html html5 humor india inspirational insurance investing ios ipad iphone japan java javascript jquery json language law laws legal libraries linux lisp mac machinelearning macs malware maps marketing mathematics medical memory microsoft mobile mooc mortgages motivational movies mozilla music mysql negotiating netflix networking newspapers newyork node nosql opensource osx pagan parenting patents pdf performance photography php podcast politics postgresql pricing printing privacy productivity profdev programming psychology publishing python rails react realestate recipes reference religion research responsive rhodeisland ruby russia sales scalability science scifi search security seo shopping sleep software space spam sql ssl startups statistics stocks storage sysadmin taxes telephony testing tools travel trends tv twitter unix usability utilities vegan versioncontrol video videogames webdev wifi windows wireless wordpress writing

Copy this bookmark:



description:


tags: