Found 49605 bookmarks
Newest
Free Programming Books – GoalKicker.com
Free Programming Books – GoalKicker.com
Free Programming Books on Android development, C, C#, CSS, HTML5, iOS development, Java, JavaScript, PowerShell, PHP, Python, SQL Sever and more
·goalkicker.com·
Free Programming Books – GoalKicker.com
The Key to Find Time for Learning | Scott H Young
The Key to Find Time for Learning | Scott H Young
How do you find time to learn in a busy schedule? Here are four strategies I use to find time between work and family life.
·scotthyoung.com·
The Key to Find Time for Learning | Scott H Young
Stephen Schwartz on Twitter
Stephen Schwartz on Twitter
Another example of the (necessary?) dark humor popular among those in the US military charged with the responsibility for actually launching or dropping nuclear weapons: pic.twitter.com/Bqw7y80nsR— Stephen Schwartz (@AtomicAnalyst) May 14, 2021
·twitter.com·
Stephen Schwartz on Twitter
Ditch the Urgency | Kislay Verma
Ditch the Urgency | Kislay Verma
Ditch the urgency to move for the sake of moving. Give learning and thinking processes the luxury of time by making it easy to put good ideas into action.
·kislayverma.com·
Ditch the Urgency | Kislay Verma
Use open source tools to set up a private VPN | Opensource.com
Use open source tools to set up a private VPN | Opensource.com
Getting from one place to another over a computer network can be a tricky thing. Aside from knowing the right address and opening the right ports, there's the question of security. For Linux, SSH is a popular default, and while there's a lot you can do with SSH it's still "just" a secure shell (that's what SSH stands for, in fact.) A broader protocol for encrypted traffic is VPN, which creates a unique, virtual private network between two points.
·opensource.com·
Use open source tools to set up a private VPN | Opensource.com
How to find WWN and WWPN of HBA card in Linux | 2DayGeek
How to find WWN and WWPN of HBA card in Linux | 2DayGeek
There are several ways to detect the WWN of a Fibre Channel (FC) HBA and their details in Linux/Unix operating systems. In this article, we will explain you the two …
·2daygeek.com·
How to find WWN and WWPN of HBA card in Linux | 2DayGeek
dtphantom’s Music Table Features a Touchscreen Jukebox with a Raspberry Pi #piday #raspberrypi @Raspberry_Pi « Adafruit Industries – Makers, hackers, artists, designers and engineers!
dtphantom’s Music Table Features a Touchscreen Jukebox with a Raspberry Pi #piday #raspberrypi @Raspberry_Pi « Adafruit Industries – Makers, hackers, artists, designers and engineers!
image dtphantom shared this Raspberry Pi woodworking build on : I designed and built a custom table that can hold the record player, speakers, and store the records. Plus it has a built in raspberr…
·blog.adafruit.com·
dtphantom’s Music Table Features a Touchscreen Jukebox with a Raspberry Pi #piday #raspberrypi @Raspberry_Pi « Adafruit Industries – Makers, hackers, artists, designers and engineers!
Gardening study: Backyard protein could help meat shortage
Gardening study: Backyard protein could help meat shortage
Researchers found that a typical backyard can produce up to 160% of the protein needed in soybeans alone. You might also try chickens or rabbits.
·fastcompany.com·
Gardening study: Backyard protein could help meat shortage
mechaniac/Map-of-ProgrammingPatterns
mechaniac/Map-of-ProgrammingPatterns
Contribute to mechaniac/Map-of-ProgrammingPatterns development by creating an account on GitHub.
·github.com·
mechaniac/Map-of-ProgrammingPatterns
Tips For Monitoring the Secure Edge for App Performance – The New Stack
Tips For Monitoring the Secure Edge for App Performance – The New Stack
The adjustment to a new permanently hybrid workforce has created a wave of investment and tooling to secure the new edge of the corporate network. Companies are increasingly exploring ways of moving their edge security controls to a cloud-delivered model, including cloud native security functions that seek to verify users’ identity, enforce organizational policies and…
·thenewstack.io·
Tips For Monitoring the Secure Edge for App Performance – The New Stack
An Example of Terrible UI Design: The Gas Gauge in the Volkswagen Atlas - Core77
An Example of Terrible UI Design: The Gas Gauge in the Volkswagen Atlas - Core77
I recently had my Volkswagen Golf Alltrack at the dealership for routine maintenance. As a courtesy, this dealership will give you a loaner car if you pre-request it. This time they gave me a new Atlas, their largest SUV model. This was just before the gas crunch hit, but fuel
·core77.com·
An Example of Terrible UI Design: The Gas Gauge in the Volkswagen Atlas - Core77
Sticky groups in the shadows [LWN.net]
Sticky groups in the shadows [LWN.net]
Group membership is normally used to grant access to some resource; examples might include using groups to control access to a shared directory, a printer, or the ability to use tools like sudo. It is possible, though, to use group membership to deny access to a resource instead, and some administrators make use of that feature. But groups only work as a negative credential if the user cannot shed them at will. Occasionally, some way to escape a group has turned up, resulting in vulnerabilities on systems where they are used to block access; despite fixes in the past, it turns out that there is still a potential problem with groups and user namespaces; this patch set from Giuseppe Scrivano seeks to mitigate it through the creation of "shadow" groups.
·lwn.net·
Sticky groups in the shadows [LWN.net]