Associative arrays (hash tables) in bash.
Github repo for a blog series about latest-gen Python stuff. Linked because I hate pages that point to pages when I just want to sit and read.
This article series is a guide to modern Python tooling with a focus on simplicity and minimalism.1 It walks you through the creation of a complete and up-to-date Python project structure, with unit tests, static analysis, type-checking, documentation, and continuous integration and delivery.
This guide is aimed at beginners who are keen to learn best practises from the start, and seasoned Python developers whose workflows are affected by boilerplate and workarounds required by the legacy toolbox.
Talks about how to put a RasPi4 into a Pi-Top. Also has links to the processes for installing the Pi-Top-specific stuff on the latest version of Raspbian to make it work.
Rooting your Android device is easier than ever before. There is a wealth of tools available to make the process as simple as possible, no matter what device you’re looking to root. Magisk is one such tool, and it really is easy to use.
An article that talks about systems of agents and some things that need to be considered about them.
With their small size and ubiquitous use, we’ve become quite accostomed to commercial home-monitoring camera systems — so much so that they tend to fade into their settings, even when prominently placed up front and center. It’s an extension of camera-equipped-everything maneuvering us to take the constant recording of our lives for granted.
Count Zero's article on magstripe reading/writing reprinted in the sci.electronics FAQ.
A tutorial on making printable envelope templates in OpenOffice.org.
An article describing five antivirus packages for Linux, just in case you&039;re feeling paranoid (or you&039;re using Linux to run a mail or file server and you want to look out for the Windows machines on your network).
article linux av antivirus software download links
A short blog post that details creating your own SSL certificate using OpenSSL.
article blogpost ssl openssl certificates generation howto tutorial
A good blog post about using SSH's little-known proxy functionality to tunnel traffic back through your home network to prevent eavesdropping. The best thing is, you don't have to set up a proxy on the other end because SSH does it for you.
An excellent article from the Internet Storm Center about carving executables out of other sorts of files (like .rtf documents) for the purposes of identification and reverse engineering.
A list of common algorithms in computer science, compiled at Wikipedia.
A really good article worth reading about "The Five Levels of ISP Evil"
A sysadmin's how-to post on getting started with VMWare ESXi.
3480 links, including 121 private