Boxology
Don't Make Me Think, Revisited: A Common Sense Approach to Web Usability by Steve Krug
Don't Make Me Think, Revisited book. Read 1,800 reviews from the world's largest community for readers. Since Don’t Make Me Think was first published in ...
Hashing, Encryption and Encoding ⋆ Mark McDonnell
Introduction I’ve written previously (and in-depth) on the subject of security basics, using tools such as GPG, OpenSSH, OpenSSL, and Keybase. But this time I wanted to focus in on the differences between encryption and hashing, whilst also providing a slightly more concise reference point for those already familiar with these concepts. Before we get started, let’s see what we’ll be covering: Terminology Hashing vs Encryption MAC vs HMAC Base64 Encoding Random Password Generation Hash Functions shasum hashlib cksum OpenSSH OpenSSL Generating a key pair Encrypting and Decrypting Randomness GPG Generating a key pair Automate Asymmetrical Encryption and Decryption Symmetrical Encryption and Decryption Signing keys Signing encrypted files Keybase Terminology OK, so using the correct terminology is essential and helps us to be explicit and clear with what we really mean.
Web Application Exploits and Defenses
OWASP Top Ten Web Application Security Risks | OWASP
The OWASP Top 10 is the reference standard for the most critical web application security risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing your software development culture focused on producing secure code.
Foundations of Security: What Every Programmer Needs to Know by Neil Daswani
Foundations of Security book. Read 7 reviews from the world's largest community for readers. Foundations of Security: What Every Programmer Needs to Know...
An Open Letter to Developers Everywhere (About Cryptography)
An Open Letter to Developers Everywhere (About Cryptography) · GitHub
(Updated) Cryptographic Right Answers
(Updated) Cryptographic Right Answers · GitHub
Rolling Your Own Crypto
So you want to roll your own crypto. Well, be careful. Be very careful.
https://www.dwheeler.com/secure-programs
GitHub - ziishaned/learn-regex: Learn regex the easy way
Learn regex the easy way. Contribute to ziishaned/learn-regex development by creating an account on GitHub.
RegexHQ
Collaboration on a world-wide community-driven collection of RegExp patterns and tools that can make our life easier. - RegexHQ
Fallacies
Tag: Jepsen
There is No Now - ACM Queue
"Now." The time elapsed between when I wrote that word and when you read it was at least a couple of weeks. That kind of delay is one that we take for granted and don
Time, Clocks and the Ordering of Events in a Distributed System - Microsoft Research
Jim Gray once told me that he had heard two different opinions of this paper: that it’s trivial and that it’s brilliant. I can’t argue with the former, and I am disinclined to argue with the latter. The origin of this paper was the note The Maintenance of Duplicate Databases by Paul Johnson and Bob […]
Dean keynote ladis2009
Designing Data-Intensive Applications by Martin Kleppmann
Designing Data-Intensive Applications book. Read 598 reviews from the world's largest community for readers. Data is at the center of many challenges in ...
What every programmer should know about memory, Part 1
Ulrich Drepper recently approached us asking if we would be interested in publishing a lengthy document he had written on how memory and software interact. We did not have to look at the text for long to realize that it would be of interest to many LWN readers. Memory usage is often the determining factor in how software performs, but good information on how to avoid memory bottlenecks is hard to find. This series of articles should change that situation. Click below (subscribers only) for the first installment.
The Problem with Time & Timezones - Computerphile
A web app that works out how many seconds ago something happened. How hard can coding that be? Tom Scott explains how time twists and turns like a twisty-turny thing. It's not to be trifled with!
A Universe of Triangles: http://www.youtube.com/watch?v=KdyvizaygyY
LZ Compression in Text: http://www.youtube.com/watch?v=goOa3DGezUA
Characters, Symbols and the Unicode Miracle: http://www.youtube.com/watch?v=MijmeoH9LT4
More from Tom Scott: http://www.youtube.com/user/enyay and https://twitter.com/tomscott
http://www.facebook.com/computerphile
https://twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Computerphile is a sister project to Brady Haran's Numberphile. See the full list of Brady's video projects at: http://bit.ly/bradychannels
Time
Latency Numbers Every Programmer Should Know
Latency Numbers Every Programmer Should Know · GitHub
Numbers Every Programmer Should Know By Year
Characters in a computer - Unicode Tutorial UTF-8 (3/3)
This tutorial explains the utf-8 way of representing characters in a computer; later generalizing (high level) how any kind of data can be represented in a computer.
Characters in a computer - ASCII Tutorial (1/3)
Video series about how characters are represented in a computer. This first part talks about the ASCII character set and the problems associated with it.
Unicode CLDR
News 2022-06-01 General submission open for CLDR v42 2022-04-06 CLDR v41 released 2021-11-03 Links to CLDR talks at Unicode Conference #45 What is CLDR? The Unicode Common Locale Data Repository (CLDR) provides key building blocks for software to support the world's languages, with the largest
GitHub - codebox/homoglyph: A big list of homoglyphs and some code to detect them
A big list of homoglyphs and some code to detect them - GitHub - codebox/homoglyph: A big list of homoglyphs and some code to detect them
The Absolute Minimum Every Software Developer Absolutely, Positively Must Know About Unicode and Character Sets (No Excuses!)
Ever wonder about that mysterious Content-Type tag? You know, the one you’re supposed to put in HTML and you never quite know what it should be? Did you ever get an email from your friends in…
Basic Number Theory Every Programmer Should Know... | CodeChef
What Every Computer Scientist Should Know About Floating-Point Arithmetic