3957
Stop Using Google Trends — Medium
Alternatively titled ‘Be aware of context, and maybe start using Google AdWords’ Instead
18 hours ago
What ORMs have taught me: just learn SQL - Curried lambda
I've come to the conclusion that, for me, ORMs are more detriment than benefit. In short, they can be used to nicely augment working with SQL in a program, but they should not replace it. Some...
yesterday
Troy Hunt: The “Cobra Effect” that is disabling paste on password fields
Back in the day when the British had a penchant for conquering the world, they ran into a little problem on the subcontinent; cobras. Turns out there were a hell of a lot of the buggers wandering around India and it also turned out that they were rather venomous which
security 
2 days ago
NAT64/DNS64 on OpenWRT | Technical Intercourse on WordPress.com
The latest stable release of OpenWRT - Barrier Break - makes it a simple matter to add NAT64 and DNS64 capabilities to the router. This is particularly useful if one wishes to run an IPv6 only internal LAN network while dealing with the IPv4 + IPv6 world of the Internet. DNS64 DNS64 provides a faux…
admin 
3 days ago
Opening the Black Box: Publishing Pebble’s activity-tracking algorithms — Pebble Research — Medium
When I started my study of bipolar disorder, I spent an inordinate amount of time comparing different devices, each differing in ease of…
6 days ago
Esh
Imagine you have a vulnerable procedure (e.g. Heartbleed), and you want to check if it was embedded in some binary in your organization, but don't know what compiler was used, or whether the code was patched. Other use-cases can be clone detection for reducing code-base maintenance code-reuse or for identifying IP theft, etc. That's where Esh comes in!
8 days ago
The hi/lo algorithm | Vlad Mihalcea's Blog on WordPress.com
Introduction In my previous post I talked about various database identifier strategies, you need to be aware of when designing the database model. We concluded that database sequences are very convenient because they are both flexible and efficient for most use cases. But even with cached sequences, the application requires a database round-trip for every…
postgres 
9 days ago
Why HttpOnly Won't Protect You
Before going in depth criticizing the HttpOnly session protection mechanism I better explain what it is and why it is useful.
security 
9 days ago
compression - How are zlib, gzip and Zip related? What do they have in common and how are they different? - Stack Overflow
The compression algorithm used in zlib is essentially the same as that in gzip and Zip. What are gzip and Zip? How are they different and how are they same?
10 days ago
Use JWT The Right Way!
Learn how to manage JWTs JSON Web Tokens securely with these simple tips
security 
12 days ago
Building the Internet of Wrongs - Raw Hex
I recently did a talk at BSides London on some of the little toys that I like to build. I’ve been tinkering with hardware for a few years now and find it fascinating. It’s a natural progression from my interests in breaking software, to breaking IoT to building my own stuff for the purposes of …
networking  hardware 
13 days ago
Four common mistakes in audio development
> This is a discussion of [four common mistakes](#four-rules) that audio developers make, [how to do better](#solutions), and [how to detect whether there’s a problem](#diagnosis). It̵…
audio 
13 days ago
Four months with Haskell
At the end of January of this year, I switched to a new job, almost exclusively because I was enticed by the idea of being able to write Haskell. The concept of using such an interesting programming language every day instead of what I’d been doing before...
haskell 
14 days ago
Your API-Centric Web App Is Probably Not Safe Against XSS and CSRF
As we're reinventing web applications with SPAs and frontend frameworks, we need to reinvent web application security, too.
security 
18 days ago
vox.SPACE: Being privacy-aware in 2016
Even if you’re not doing anything wrong, you are being watched and recorded. – Edward Snowden As more and more people are living a digital life inside their computers, discussions about p
privacy  security 
22 days ago
SyntaxDB - Programming Syntax Database
SyntaxDB lets you easily look up syntax for your favourite programming language. Now supporting Java, C, C++, C#, JavaScript, Swift, Python, Ruby, and Go.
tools 
25 days ago
JVM JIT optimization techniques - Advanced Web Machinery
An overview of JVM JIT optimization techniques and fun with measurements.
java 
4 weeks ago
Practical Dependent Types in Haskell: Type-Safe Neural Networks (Part 1) · in Code
It seems these days like programming with dependent types in Haskell (and its advantages) is moving slowly but steadily to the mainstream of Haskell programming. In the current state of Haskell education, dependent types are often considered topics for advanced Haskell users. However, I can foresee a day where the ease of use of modern Haskell libraries relying on dependent types forces programming with dependent types to be an integral part of normal intermediate (or even beginner) Haskell education. There are more and more and more and more great resources and tutorials and introductions to integrating dependent types into your Haskell every day. The point of this series is to show more some practical examples of using dependent types in guiding your programming, and to also walk through the why and high-level philosophy of the way you structure your Haskell programs. It’ll also hopefully instill an intuition of a dependently typed work flow of exploring how dependent types can help your current programs. The intended audience of this post is for intermediate Haskell programmers in general, with no required knowledge of dependently typed programming. I should also point out that I’m no expert — I’m still in the process of learning this all, myself :) The first project in this series will build up to a type-safe artificial neural network implementation with back-propagation training.
haskell 
4 weeks ago
OpenBSD/loongson on the Lemote Yeeloong 8101B - Cambus.net
Running the OpenBSD/loongson port on a Lemote Yeeloong 8101B
unix 
5 weeks ago
HOWTO: WPA2-Enterprise with FreeRadius | The FreeBSD Forums
In this tutorial you will be able to successfully set up a home wireless network using FreeBSD and WPA2-Enterprise option on your wireless router....
admin  security 
5 weeks ago
Turn a $60-$120 router into an Enterprise class wireless router with OpenWRT | Jack of All I.T. on WordPress.com
Enterprise Wireless Security and You! Enterprise Wireless is all about security. If you had customer transactions going over a wireless network, you'd want to be sure your data was protected from hackers. Unfortunately, Enterprise security typically involves expensive access point hardware, a radius server, and a complicated configuration. But, it doesn't have to be hard!…
security  admin 
5 weeks ago
Our best practices are killing mobile web performance · molily
Web performance rules invented for desktop web access need be revised for the mobile era.
webdev 
5 weeks ago
Best Practices for Using the Vary Header | Fastly
Vary is one of the most powerful HTTP response headers. Used correctly, it can do wonderful things. Unfortunately, this header is frequently used incorrectly, which can lead to abysmal hit ratios. Worse still, if it's not used when it should be, the wrong content could be delivered.
webdev 
5 weeks ago
Eliza Gauger, it’s a good question and im not sure hwat the...
it’s a good question and im not sure hwat the answer is. i like to rag on lead designers as much as anyone else, mostly because they’re convenient figureheads to accept blame, and they usually dress...
culture 
5 weeks ago
10 thousand times faster Swift — Medium
I guess this blog post is irrelevant for most App developers, as the performance optimisations, or rather pitfalls which I will discuss in…
swift 
6 weeks ago
Caching Tutorial for Web Authors and Webmasters
Covers the how's and why's of Web caching for people who publish on the Web. With FAQs.
6 weeks ago
Top 10 dumb mistakes to avoid with C++ 11 smart pointers - A CODER'S JOURNEY
I love the new C++ 11 smart pointers. In many ways, they were a godsent for many folks who hate
6 weeks ago
Lambda expression comparison between C++11, C++14 and C++17 – Oscar Forner's personal website
In this post I talk about what has been added in the C++ standard regarding lambda expressions since they were introduced in C++11.
6 weeks ago
DDos Mitigation - Using NGINX to Prevent DDoS Attacks | NGINX
Learn about the features in NGINX and NGINX Plus that make them a valuable part of a solution for DDoS attack mitigation
security  networking 
6 weeks ago
« earlier      
accessibility admin algo android apple audio c clojure content css culture design devops django dotnet elixir emacs erlang fun gc git golang graphics hardware haskell java javascript latex math music mysql nethack networking ocaml photoshop php pl postgres privacy prolog python redis ruby rust scala security smalltalk svg swift talk tools typography unicode unix via:macdrifter via:sunpig via:tlockney video vim webdev windows zfs

Copy this bookmark:



description:


tags: