-
What brings you to web development? What's your goal? What's your passion? What wakes you up in the middle of the night?
-
Tell me about common themes you run into working in the UI. How did you address them?
- UX/Design changes?
- What’s difficult, what’s fun?
- Localization
-
What do you do to keep up to date with technology (blogs, conferences, etc)?
- What blogs do you follow?
- If you could master one technology this year, what would it be?
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| ############################################################################### | |
| # The MIT License | |
| # | |
| # Copyright 2012-2014 Jakub Jirutka <[email protected]>. | |
| # | |
| # Permission is hereby granted, free of charge, to any person obtaining a copy | |
| # of this software and associated documentation files (the "Software"), to deal | |
| # in the Software without restriction, including without limitation the rights | |
| # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | |
| # copies of the Software, and to permit persons to whom the Software is |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| http://d.stavrovski.net/blog/post/how-to-install-and-setup-oracle-java-jdk-in-centos-6 | |
| # rpm | |
| wget --no-cookies \ | |
| --no-check-certificate \ | |
| --header "Cookie: oraclelicense=accept-securebackup-cookie" \ | |
| "http://download.oracle.com/otn-pub/java/jdk/7u55-b13/jdk-7u55-linux-x64.rpm" \ | |
| -O jdk-7-linux-x64.rpm | |
| # ubuntu |
The Recommended Reading List is a valuable resource for technical professionals who want to thoroughly explore topics such as multi-core programming, embedded, security, and more. Dozens of industry technologists, corporate fellows, and engineers have helped by suggesting books and reviewing the list.
- Power Management in Mobile Devices - Findlay Shearer - Newnes - 9780750679589
- Thermal and Power Management of Integrated Circuits - Arman Vassighi, Manoj Sachdev - Springer - 9781441938329
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Security Onion | |
| Aug 2014: | |
| ... my purpose for installing this was to: | |
| - learn more about security stuff | |
| - steal the packet captures (pcap) provided so I can replay them using tcpreplay for snort testing, | |
| as it's not so sexy to just test using ICMP ping data or local rules that match anything | |
| see: | |
| http://blog.securityonion.net/ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| https://reputation.alienvault.com/reputation.generic.gz | |
| https://reputation.alienvault.com/reputation.generic | |
| https://reputation.alienvault.com/reputation.data | |
| https://reputation.alienvault.com/reputation.snort.gz | |
| https://reputation.alienvault.com/reputation.snort | |
| https://reputation.alienvault.com/reputation.iptables.gz | |
| https://reputation.alienvault.com/reputation.iptables | |
| https://reputation.alienvault.com/reputation.squid.gz | |
| https://reputation.alienvault.com/reputation.squid | |
| https://reputation.alienvault.com/reputation.unix.gz |
No, seriously, don't. You're probably reading this because you've asked what VPN service to use, and this is the answer.
Note: The content in this post does not apply to using VPN for their intended purpose; that is, as a virtual private (internal) network. It only applies to using it as a glorified proxy, which is what every third-party "VPN provider" does.
- A Russian translation of this article can be found here, contributed by Timur Demin.
- A Turkish translation can be found here, contributed by agyild.
- There's also this article about VPN services, which is honestly better written (and has more cat pictures!) than my article.
Picking the right architecture = Picking the right battles + Managing trade-offs
- Clarify and agree on the scope of the system
- User cases (description of sequences of events that, taken together, lead to a system doing something useful)
- Who is going to use it?
- How are they going to use it?
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| # | |
| # Requires NMAP, NDIFF and Slackcli | |
| # https://candrholdings.github.io/slack-cli/ | |
| # TARGETS should be set by env variable | |
| # INTERVAL how many seconds to wait between scans | |
| # SLACKTOKEN from here https://api.slack.com/web | |
| TARGETS="scanme.handsonhacking.org" |
OlderNewer