to … is to be human
The Cult of Done Manifesto
The Cult of Done Manifesto
Read more ⟶
How to get things done?
a simple and effective Yellow note TODO system
Read more ⟶
MSjoke
MSjoke
Read more ⟶
My toaster
My toaster
Read more ⟶
Pen and Paper games
Pen and paper games
Read more ⟶
phoenix questions
The Phoenix questions checklist
Read more ⟶
readline shortcuts
readline shortcuts
Read more ⟶
Rob Pike's 5 Rules of Programming
Rob Pike's 5 Rules of Programming
Read more ⟶
Slashdot spamsolutions
Slashdot spamsolutions
Read more ⟶
The four keys that could unlock procrastination
unlock procrastination
Read more ⟶
The Narcassist's Prayer
The Narcassist's Prayer
Read more ⟶
The worst IT invention ever
dynamic linking
Read more ⟶
Useful sed
usefull sed tips and tricks
Read more ⟶
Drawbacks of smart-phones Planned obsolidence (no more updates after N years). All the time fighting with pre-installed apps and applications that always want to do the wrong thing Short battery life. There is always “range ancienty” with a smartphone. Smartphones do everything ok, except calling. Smartphone prevent you from seeing and interacting with the outside world. always distractions and notifications. They are expensive. No more almost daily updating of apps on your phone.…
Read more ⟶
default security responses
Dear Submitter,
We would like to thank you for the efforts you made in reporting this issue, but we’re afraid we can’t honor this as a valid bug-report.
The kind of bug you’re reporting is a:
content injection attack XSS attack ‘missing features’ thingy (HSTS, X-XSS, DKIM, SPF, etc) set header because browser X is crappy and doing stupid, insecure things (X-Content-Type-Options,etc) report I think you should do X advisory valid bug Behavior that is there for a real purpose information disclosure report valid bug if it was exploitable on our platform Theoretical behavior that’s not exploitable in the real world (TM) Disclosure of info that might be used during the reconnaissance stage The reason for not honoring the bug is that:…
Read more ⟶
dns2tcp
SSH Tunneling via DNS DNS-tunneling via dns2tcp kan een manier van toegang tot een shell server zijn als je bijvoorbeeld achter een zeer strikt ingestelde firewall zit, die zowel poort 22 als poort 443 (waarop de shell server ook bereikbaar is) blokkeert. Probeer dus altijd eerst of je ‘normaal’ ssh toegang kunt krijgen via poort 22 of 443, voordat je het onderstaande ‘paardemiddel’ inzet voor ssh toegang.
Om dns2tcp te gebruiken die je eerst de dns2tcp client te installeren.…
Read more ⟶
Execution in the Kingdom of Nouns
text mirror of: http://steve-yegge.blogspot.com/2006/03/execution-in-kingdom-of-nouns.html
Stevey’s Blog Rants
Random whining and stuff.
Thursday, March 30, 2006
Execution in the Kingdom of Nouns
They've a temper, some of them—particularly verbs: they're the proudest—adjectives you can do anything with, but not verbs—however, I can manage the whole lot of them! Impenetrability! That's what I say! — Humpty Dumpty Hello, world! Today we’re going to hear the story of Evil King Java and his quest for worldwide verb stamp-outage.…
Read more ⟶
How to write code?
How to write code? Or: things I would have loved to have heard 20 years ago.
DEFINE YOUR DATA FIRST
Start with your data-model. Make sure you define all data you need, what the types are, and how they are related.
If possible allow some flexibility, for instance by allowing key => value strings to extend the properties a entity can have.
In case of doubt, use SQLite for data-storage. Try to only use SQL that can also be used for MySQL, MS-SQL, PgSQL, etc.…
Read more ⟶
IMG
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | !…
Read more ⟶