moreutils moreutils is a collection of the unix tools that nobody thought to write long ago when unix was young.
DuckDuckGo Removes Pirate Sites and YouTube-DL from Its Search Results * TorrentFreak Search engine DuckDuckGo has completely removed all search results for popular pirate sites including The Pirate Bay, 1337x, and Fmovies.
.NET 7 Preview 3 Is All About Native AOT -- Visual Studio Magazine Microsoft's new .NET 7 Preview 3 showcases native ahead-of-time (AOT) compilation, a much-requested and long-awaited feature for .NET, with Microsoft even taking the time to explain what it is.
Adds Tizen backend by rookiejava · Pull Request #2360 · dotnet/maui Description of Change This PR adds Tizen backend. .NET MAUI Tizen Progress .NET MAUI Tizen Detailed Status .NET workload for Tizen Known Issues Build your first .NET MAUI App for Tizen Demo - W...
.NET MAUI Release Candidate Ships with 'Go Live' Support -- Visual Studio Magazine .NET MAUI, Microsoft's tardy 'evolution' of Xamarin.Forms, has shipped as a Release Candidate with 'go live' support for production-ready applications.
Release NVIM v0.7.0 · neovim/neovim NVIM v0.7.0 Build type: Release LuaJIT 2.1.0-beta3 Install Windows Zip Download nvim-win64.zip Extract the zip. Run nvim-qt.exe MSI Download nvim-win64.msi Run the MSI Search and run nvim-qt.e...
The Dunning-Kruger Effect is Autocorrelation – Economics from the Top Down Do unskilled people actually underestimate their incompetence?
Create a gitignore file with dotnet cli When I create a new project on GitHub, the first thing that I add in the initial repository is the...
Enable support for FIDO2/U2F security keys by martelletto · Pull Request #541 · PowerShell/openssh-portable This PR enables client-side support for FIDO2/U2F security keys, allowing the generation and use of ecdsa-sk and ed25519-sk SSH keys on cross-platform and platform authenticators, from PowerShell a...
It’s Still Stupidly, Ridiculously Difficult To Buy A ‘Dumb’ TV Historically, “smart” TVs aren’t always particularly smart. They’ve routinely been shown to have lax security and privacy standards. They also routinely feature embedded OS …
Google Chrome emergency update fixes zero-day used in attacks Google has released Chrome 100.0.4896.127 for Windows, Mac, and Linux, to fix a high-severity zero-day vulnerability actively used by threat actors in attacks.
Breaking down broadband nutrition labels We commend Congress for including broadband nutrition labels in the Infrastructure Investment and Jobs Act, and the FCC for moving quickly to implement the labels
Episode 96 - The Programmer's Brain with Felienne Hermans In this episode we talked with Dr. Felienne Hermans about her book The Programmer's Brain. We also discussed things like code reading clubs, and strategies for learning a new code base on a deeper level.
StarBook 14-inch The StarBook Mk V has an increased chassis size when compared to its predecessor. This allows for a battery that is 10% larger, a 14-inch display, twice the amount of speakers and removable memory.
Ethereum Has Issues I first wrote about the problem of bots front-running transactions a year and a half ago in The Order Flow , citing Dan Robinson and Georgio...
1,000,000 Concurrent Connections I hear the misconception that a server can only accept 65K connections or a server consumes a port for each accepted connection all the time. Here is a taste of some of them: A TCP/IP address only supports 65,000 connections, so you would have to have to ...
GitHub - LuanRT/YouTube.js: 🎥 full-featured wrapper around YouTube's private API 🎥 full-featured wrapper around YouTube's private API - GitHub - LuanRT/YouTube.js: 🎥 full-featured wrapper around YouTube's private API
Refactoring Toward Algorithms in Elixir Algorithms give a name to a kind of data transformation. They’re the building blocks of programs, and they’re fractal: a program as a whole can be seen as an algorithm, and it’s m…
r/programminghorror - Hey... let's use automapper to generate passwords. 429 votes and 24 comments so far on Reddit
Plastic Surgery And Virtual Reality The wellness industry is a multi-billion dollar testament that people want to improve their looks. This article argues that virtual reality will give people perfect control over their appearance and make plastic surgery obsolete.
How To Capture Ideas Effectively With Roam Research - Curious Maverick You have at least 5 great ideas everyday. But, how much of it do you truly capture? Here's a simple framework to capture them with Roam Research.
A Web Renaissance Thanks to the mistrust of big tech, the creation of better tools for developers, and the weird and wonderful creativity of ordinary people, we’re seeing an incredibly unlikely comeback: the web is thriving again. If you had to pick the unexpected breakout...
Revisiting Rock Paper Scissors in Python Let’s implement this classic programming exercise from a more advanced perspective.
Therading From Scratch A series of posts on building a simple yet mostly complete threading library on top of Linux syscalls.
Notes on Long-Form Notes Like many people, I find the subject of note-taking to be a little more than a curiosity given I rely on it extensively on a daily basis.
How To Build an Evil Compiler Did you know there is a type of compiler backdoor attack that is impossible to defend against? In this post I’ll show you how to implement such an attack in less than 100 lines of code.
Do You Really Code? · It Will Never Work in Theory Reviewed by Greg Wilson / 2022-04-13 Keywords: Interviewing, Research Methods
Migrating to Fastmail So you want to migrate over to Fastmail for your email — here's how you can go about doing so as seemlessly as possible.