With every Python release, there are new modules being added and new and better ways of doing things get introduced. We all get used to using the good old Python libraries and to certain way of doing things, but it's time upgrade and make use of the new and improved modules and their features.
- Use f-strings.
How to use rossumur/esp_8_bit's atr_image_explorer.html file to explore the contents of ATR disk images and disassemble the files.
Sieve is a programming language that can be used for email filtering. It owes its creation to the CMU Cyrus Project, creators of Cyrus IMAP server.
The language is not tied to any particular operating system or mail architecture. It requires the use of RFC-2822–compliant messages, but otherwise should generalize to other systems that meet these criteria. The current version of Sieve's base specification is outlined in RFC 5228, published in January 2008.
Associative arrays (hash tables) in bash.
Github repo for a blog series about latest-gen Python stuff. Linked because I hate pages that point to pages when I just want to sit and read.
This article series is a guide to modern Python tooling with a focus on simplicity and minimalism.1 It walks you through the creation of a complete and up-to-date Python project structure, with unit tests, static analysis, type-checking, documentation, and continuous integration and delivery.
This guide is aimed at beginners who are keen to learn best practises from the start, and seasoned Python developers whose workflows are affected by boilerplate and workarounds required by the legacy toolbox.
Talks about how to put a RasPi4 into a Pi-Top. Also has links to the processes for installing the Pi-Top-specific stuff on the latest version of Raspbian to make it work.
Rooting your Android device is easier than ever before. There is a wealth of tools available to make the process as simple as possible, no matter what device you’re looking to root. Magisk is one such tool, and it really is easy to use.
An article that talks about systems of agents and some things that need to be considered about them.
With their small size and ubiquitous use, we’ve become quite accostomed to commercial home-monitoring camera systems — so much so that they tend to fade into their settings, even when prominently placed up front and center. It’s an extension of camera-equipped-everything maneuvering us to take the constant recording of our lives for granted.
Count Zero's article on magstripe reading/writing reprinted in the sci.electronics FAQ.
A tutorial on making printable envelope templates in OpenOffice.org.
A good blog post about using SSH's little-known proxy functionality to tunnel traffic back through your home network to prevent eavesdropping. The best thing is, you don't have to set up a proxy on the other end because SSH does it for you.
A list of common algorithms in computer science, compiled at Wikipedia.
A sysadmin's how-to post on getting started with VMWare ESXi.
Some useful suggestions for bloggers who are also politically or socially active, i.e., a likely target of (secret) police because of their opinions or social connections. In short, develop a contingency plan in the event that you are captured, hospitalized, or killed that lets trusted associates act in your stead on your website. I've looked over this article and they recommend a large number of things that I also have built into my dead man's switches, so I recommend it.
How matrix algebra can be used on a table of names and membership checkmarks to develop a detailed social connection network.
4220 links, including 280 private