3316
SSH Proxy Commands that use `sed`
If you find yourself using a Bastion or Jump Server very often, you quickly become familiar with man ssh_config.

One trick I've recently figured out is using sed with a ProxyCommand -- this lets me optionally use a bastion host by just appending .bast to a hostname. Most examples of using ProxyCommand apply it to all hosts, or a specific sub-domain, but this configuration allows you to late decide if you want to use the bastion or not.
security  admin  devops  unix 
3 hours ago
The Universe of Discourse : A public service announcement about contracts
A PSA about contracts: and, examples of contracts you should not sign: both by
from twitter_favs
4 days ago
The Universe of Discourse : Examples of contracts you should not sign
A PSA about contracts: and, examples of contracts you should not sign: both by
from twitter_favs
4 days ago
The joyless world of data-driven startups
Everyone tells early stage startups to use data for big strategic decisions. But does that really work, and whatever happened to vision?
culture 
16 days ago
The controller pattern is awful (and other OO heresy)
Easy litmus test: what is an instance of your class, in no more than five words? Most stupid classes require explanations that begin “it’s an object that…” and then you only have one word left. Sensible objects should have a description. They should be something. Lists are sequences of items. Modules are containers for related code. Jobs are scheduled maintenance tasks. Applications are dispatchers for an entire site.
pl 
26 days ago
The Comonad.Reader » Free Monoids in Haskell
will the real free monoid (in Haskell) please stand up?
haskell  from twitter_favs
4 weeks ago
SVG layout with Flexbox for simpler D3 charts
I didn’t know this was possible! → Applying Flexbox to SVG
for creating charts. Complex but impressive!
h/t
svg  webdev  from twitter_favs
4 weeks ago
ChicagoFLF
Apple Macintosh original typeface
typography 
5 weeks ago
Untitled (http://www.icir.org/johanna/papers/conext14tangledmass.pdf)
RT : If you think Lenovo's "just add ONE" root certificate is bad, you've not seen what Android vendors & carriers do:
from twitter_favs
5 weeks ago
Type-based lift - Roman Cheplyaka
In mtl, the ask method of the MonadReader class will automatically «lift» itself to the topmost ReaderT layer in the stack, which is very convenient, but only works as long as the topmost layer is the one you need. If you have multiple ReaderTs in the stack, you often have to insert manual lifts.

Previously I described why a smarter automatic lifting mechanism is needed to build truly reusable pieces of monadic code without too much boilerplate.

In this article I show two ways to achieve a type-based lift (that is, a lift which takes into account the r of ReaderT r), one relying on IncoherentInstances, the other — on closed type families.
haskell 
5 weeks ago
Why I Don't Hate Git: Hidden Consistency - Armin Ronacher's Thoughts and Writings
I think I want more software like git. Software where the way it works is a crucial part of the user experience. Where there is no disconnect between how it works, and how it presents itself to the user.
git 
5 weeks ago
PowerSpy: Location Tracking using Mobile Device Power Analysis
Dan Boneh's latest paper shows how to locate a smartphone based on its power consumption (no permissions required).
security  from twitter_favs
5 weeks ago
What is Sieve?
Sieve (RFC 5228) is a language for filtering e-mail messages. It is designed to be implementable on either a mail client or mail server. It is meant to be extensible, simple and independent of access protocol, mail architecture and operating system. It is suitable for running on a mail server where users may not be allowed to execute arbitrary programs, such as on black box IMAP servers, since in its basic form it has no variables, loops or ability to shell out to external programs.
admin 
5 weeks ago
10 C99 tricks
Here are ten interesting patterns and tricks I sometime use in my C code, some are well known, some not so much. I am sure all of them work with clang and gcc (after fixing the evetual typos). I didn't try with MSVC, but except for no 1 and 5, I think it should also work.
c 
5 weeks ago
Enter the arena: inside the korobka, the heart of Russian football - The Calvert Journal
RT : No referee, no rules, no quarter given. This is the korobka, the home of real Russian football
from twitter_favs
6 weeks ago
FAQs about FAQs
Department of redundancy department: FAQs about FAQs.
from twitter_favs
6 weeks ago
Fuzzy substring matching with Levenshtein distance in Python
Levenshtein distance is a well known technique for fuzzy string matching. With a couple of modifications, it's also possible to use Levenshtein distance to do fuzzy matching of substrings.
algo 
7 weeks ago
The curious case of the disappearing Polish S
One keyboard bug three decades in the making
7 weeks ago
Get your loved ones off Facebook.
I wrote this for my friends and family, to explain why the latest Facebook privacy policy is really harmful. Maybe it'll help you too. External references -- and steps to get off properly -- at the bottom.
privacy 
7 weeks ago
USE Method: FreeBSD Performance Checklist
This page contains an example USE Method-based performance checklist for FreeBSD, for identifying common bottlenecks and errors. This is intended to be used early in a performance investigation, before moving onto more time consuming methodologies. This should be helpful for anyone using FreeBSD, especially system administrators.

This was developed on FreeBSD 10.0 alpha, and focuses on tools shipped by default. With DTrace, I was able to create a few new one-liners to answer some metrics. See the notes below the tables.
unix  admin 
7 weeks ago
The Four Horsemen of the Performance Apocalypse
The four horsemen are: Doing Unnecessary Work. Ignoring constant time inefficiencies. Unnecessary generalization. Compound Interest.
7 weeks ago
Stuff Goes Bad - Erlang in Anger
This book intends to be a little guide about how to be the Erlang medic in a time of war. It is first and foremost a collection of tips and tricks to help understand where failures come from, and a dictionary of different code snippets and practices that helped developers debug production systems that were built in Erlang.
erlang 
7 weeks ago
Signing in to websites with SSH
Instead of remembering many passwords for different servers, you can generate a single SSH key which gets stored on your computer and authenticates you without typing out a password each time.

Could regular websites offer SSH as a sign-in option? Yes, it is indeed possible, but after making a proof-of-concept I can see why it hasn’t caught on.
security 
8 weeks ago
Silicon Valley Has Lost Its Way. Can Skateboarding Legend Rodney Mullen Help It? | WIRED
RT : Lovely profile of my friend, legendary skateboarder Rodney Mullen A gentle, humble genius!
from twitter_favs
8 weeks ago
Secure Quick Reliable Login
Proposing a comprehensive, easy-to-use, high security replacement for usernames,
passwords, reminders, one-time-code authenticators . . . and everything else.
With SQRL (Secure Quick Reliable Login)
you either tap, snap, or click a login page's
QR code and YOU are securely logged in.
security 
8 weeks ago
λ Bubble Pop!
Ever thought that LISP sexps were like little bubbles of computation, waiting to be popped to reveal their evaluated center? No? You will now! Click on the bubbles to pop them, pop them all to complete the computation! It's the satisfaction of popping bubble wrap, combined with the satisfaction of really elegant functional programming!
haskell  fun 
8 weeks ago
C&C - Why Constructive Logic
A lot of people in and around the Haskell/FP community will make statements like

The Curry-Howard isomorphism means that you’re proving things in constructive logic.

Usually absent from these remarks is a nice explanation of why constructive logic matches up with the programming we know and love.

In this post I’d like to highlight what constructive logic is intended to capture and why this corresponds so nicely with programming.
haskell  math 
8 weeks ago
« earlier      
accessibility admin algo android apple audio c clojure content css culture design devops django dotnet elixir emacs ember erlang fun gc git golang graphics hardware haskell indieweb java javascript latex math monads mongodb music mysql nethack networking ocaml photoshop php pl postgres privacy prolog python react redis ruby rust scala security svg swift talk tools typography unix via:macdrifter via:sunpig via:tlockney video vim webdev windows wtfjs zfs

Copy this bookmark:



description:


tags: