to … is to be human
The Narcassist's Prayer
The Narcassist's Prayer
Read more ⟶
The worst IT invention ever
dynamic linking
Read more ⟶
Why optimism?
Why optimism is the better choice -- written by a pessimist
Read more ⟶
Wrong assumptions
Wrong assumptions are at the hart of all doomsday predictions
Read more ⟶
phoenix questions
The Phoenix questions checklist
Read more ⟶
Comments to 68 Bits of Unsolicited Advice
Comments to 68 Bits of Unsolicited Advice
Read more ⟶
How to write code?
How to write code? Or: things I would have loved to have heard 20 years ago.
DEFINE YOUR DATA FIRST
Start with your data-model. Make sure you define all data you need, what the types are, and how they are related.
If possible allow some flexibility, for instance by allowing key => value strings to extend the properties a entity can have.
In case of doubt, use SQLite for data-storage. Try to only use SQL that can also be used for MySQL, MS-SQL, PgSQL, etc.…
Read more ⟶
default security responses
Dear Submitter,
We would like to thank you for the efforts you made in reporting this issue, but we’re afraid we can’t honor this as a valid bug-report.
The kind of bug you’re reporting is a:
content injection attack XSS attack ‘missing features’ thingy (HSTS, X-XSS, DKIM, SPF, etc) set header because browser X is crappy and doing stupid, insecure things (X-Content-Type-Options,etc) report I think you should do X advisory valid bug Behavior that is there for a real purpose information disclosure report valid bug if it was exploitable on our platform Theoretical behavior that’s not exploitable in the real world (TM) Disclosure of info that might be used during the reconnaissance stage The reason for not honoring the bug is that:…
Read more ⟶
How to get things done?
a simple and effective Yellow note TODO system
Read more ⟶
My toaster
My toaster
Read more ⟶
DARPA's Heilmeier Catechism
George H. Heilmeier, a former DARPA director (1975-1977), crafted a set of questions known as the “Heilmeier Catechism” to help Agency officials think through and evaluate proposed research programs.
What are you trying to do? Articulate your objectives using absolutely no jargon. How is it done today, and what are the limits of current practice? What is new in your approach and why do you think it will be successful?…
Read more ⟶
Drawbacks of smartphones
Drawbacks of smart-phones Planned obsolidence (no more updates after N years). All the time fighting with pre-installed apps and applications that always want to do the wrong thing Short battery life. There is always “range ancienty” with a smartphone. Smartphones do everything ok, except calling. Smartphone prevent you from seeing and interacting with the outside world. always distractions and notifications. They are expensive. No more almost daily updating of apps on your phone.…
Read more ⟶
Pen and Paper games
Pen and paper games
Read more ⟶
Rob Pike's 5 Rules of Programming
Rob Pike's 5 Rules of Programming
Read more ⟶
The Cattle mutilations wave of 1973-1980
The Cattle mutilations wave of 1973-1980
Read more ⟶
The Cult of Done Manifesto
The Cult of Done Manifesto
Read more ⟶
MSjoke
MSjoke
Read more ⟶
Useful sed
usefull sed tips and tricks
Read more ⟶
readline shortcuts
readline shortcuts
Read more ⟶
Slashdot spamsolutions
Slashdot spamsolutions
Read more ⟶