2616
Post Flat Design - Collective Ray Blog
@sparkly_julie: Wells on "Post Flat Design". Nice blog post.
design 
9 days ago
Superhero.js
Creating, testing and maintaining a large JavaScript code base is not easy — especially since great resources on how to do this are hard to find. This page is a collection of the best articles, videos and presentations we've found on the topic.
javascript 
10 days ago
Smooth state animations with animation-play-state
When a CSS animation is applied from the beginning of the page load, things are easy. You just use the animation property with appropriate parameters, and you’re done. However, what if the animation is applied on a certain state, e.g. :hover, :active, :focus or a JS-triggered class change?
css  webdev 
11 days ago
Common threads: OpenSSH key management, Part 1
"In this series, you'll learn how RSA and DSA authentication work, and see how to set up passwordless authentication the right way. In the first article of the series, Daniel Robbins focuses on introducing the RSA and DSA authentication protocols and showing you how to get them working over the network."
security  via:sunpig 
11 days ago
Hello, JIT World: The Joy of Simple JITs
This is a demonstration of how simple and enjoyable small JITs (just-in-time compilers) can be. The word "JIT" tends to invoke an image of deepest wizardry, something that only teams of the most hard-core compiler guys would ever dream of creating. It makes you think of the JVM or .NET, very large runtimes with hundreds of thousands of lines of code. You never see "Hello, World!" sized programs for JITs that do something interesting in a small amount of code. This article is an attempt to change that.
c 
11 days ago
Progress Button Styles
Creative effects for loading buttons
css  design 
11 days ago
Fortinet Blog | News and Threat Research AngeCryption at Insomni'Hack
RT : Angecryption... for begginners :) - or how I turned Anakin into Darth Vador. See : cc:
from twitter_favs
11 days ago
Kurt Cobain and Masculinity
RT : An interesting deconstruction of Kurt Cobain's gender expression and relationship with toxic masculinity:
from twitter_favs
11 days ago
Halt and Catch Fire - Wikipedia, the free encyclopedia
RT : It's been a while since HCF (Halt & Catch Fire) has been part of any standard instruction set...
from twitter_favs
14 days ago
Performance tuning - OpenZFS
PostgreSQL: Writes to partial records are expensive. Give PostgreSQL its own dataset for its databases and set recordsize=8K on it to avoid partial record writes. Also, PostgreSQL implements its own cache algorithm similar to ARC that is specialized for databases; avoiding double caching with primarycache=metadata will likely increase performance.
unix  postgres 
14 days ago
the origin of the <blink> tag - www
RT : One of the authors of lynx went to Netscape, where he inspired the creation of the <blink> tag.
from twitter_favs
16 days ago
Make a Passive Network Tap
RT : Instructables is more exciting than I previously thought. "Instructables: Make a Passive Network Tap"
from twitter_favs
16 days ago
When Nerds Collide
My intersectionality will have weirdoes or it will be bullshit.
culture 
19 days ago
zxcvbn: realistic password strength estimation
an open source estimator that catches common patterns, and as a corollary, doesn’t penalize sufficiently complex passphrases like correcthorsebatterystaple
security 
21 days ago
Text File formats – ASCII Delimited Text – Not CSV or TAB delimited text
The most anoying thing about the whole problem is that it was solved by design in the ASCII character set.

If you use ASCII 31 as your field separator instead of comma or tab, and ASCII 30 as your record separator instead of new line. Then you have a text file format that is trivial to write out and read in, with no restrictions on the text in fields or the need to try and escape characters.
21 days ago
Twitter / mitchellh: Wow, A380 and B737 parallel ...
RT : Wow, A380 and B737 parallel approach @ LAX. Crazy comparison. I fly 737s on most domestic routes. via
from twitter_favs
21 days ago
EncFS Security Audit
This report is the result of a paid 10-hour security audit of EncFS. It has been posted to the EncFS mailing list, so check there for follow-up. I feel that full disclosure is the best approach for disclosing these vulnerabilities, since some of the issues have already been disclosed but haven't been fixed, and by disclosing them, users can immediately re-evaluate their use of EncFS.
security 
5 weeks ago
Entropy Attacks!
The conventional wisdom is that hashing more entropy sources can't hurt: if H is any modern cryptographic hash function then H(x,y,z) is at least as good a random number as H(x,y), no matter how awful z is. So we pile one source on top of another, hashing them all together and hoping that at least one of them is good.

But what if z comes from a malicious source that can snoop on x and y? For example, imagine a malicious "secure randomness" USB device that's actually spying on all your other randomness sources through various side channels, or—worse—imagine RDRAND microcode that's looking at the randomness pool that it's about to be hashed into. I should note that none of the attacks described below rely on tampering with x or y, or otherwise modifying data outside the malicious entropy source; you can't stop these attacks by double-checking the integrity of data.

Of course, the malicious device will also be able to see other sensitive information, not just x and y. But this doesn't mean that it's cheap for the attacker to exfiltrate this information! The attacker needs to find a communication channel out of the spying device. Randomness generation influenced by the device is a particularly attractive choice of channel, as I'll explain below.
security 
5 weeks ago
Myths about /dev/urandom
There are a few things about /dev/urandom and /dev/random that are repeated again and again. Still they are false.
security  unix 
5 weeks ago
Luculent
Luculent is a family of scalable (vector), monospaced, geometric sans-serif screen fonts designed for programmers. I began developing it in October 2008 after trying out as many of the available programming typefaces as I could find at the time. I wanted a pleasant looking typeface that could stand up to many hours a day of scrutiny. Though many good ones exist, none of them quite satisfied me or had every feature that I wanted. I decided to try making my own and the result was Luculent.
typography 
5 weeks ago
miTLS
miTLS is a verified reference implementation of the TLS protocol. Our code fully supports its wire formats, ciphersuites, sessions and connections, re-handshakes and resumptions, alerts and errors, and data fragmentation, as prescribed in the RFCs; it interoperates with mainstream web browsers and servers. At the same time, our code is carefully structured to enable its modular, automated verification, from its main API down to computational assumptions on its cryptographic algorithms.
security 
6 weeks ago
Twitter / SamusAranX: canPlayType returns one of ...
RT : canPlayType returns one of three values:
1. probably
2. maybe
3. "" (the empty string)
from twitter_favs
6 weeks ago
« earlier      
accessibility admin algo android apple c clojure content css culture design devops django elixir emacs ember erlang fun gc git golang graphics haskell java javascript latex llvm monads mongodb music mysql nethack networking photoshop php postgres privacy python redis ruby rust scala security svg talk tools typography unix via:sunpig via:tlockney video vim webdev wtfjs

Copy this bookmark:



description:


tags: