Categories
Return to Posts
algorithms (1)
artificial-intelligence (2)
aws (8)
distributed-systems (4)
docker (1)
finances (2)
git (2)
go (1)
ides-and-editors (2)
linux (13)
-
May 3, 2020:
Investigating 'You don't have enough free space in /var/cache/apt/archives/' errors
-
Apr 12, 2017:
(LXDE) Adding user-specific start menu items
-
Jun 13, 2016:
Checking in on the "Let's Use Linux" experiment
-
May 17, 2016:
(Epson) Configuring printers on Linux
-
May 16, 2016:
Reviving a dead laptop with Linux
-
Apr 28, 2016:
Upgrading to Debian Testing
-
Apr 25, 2016:
Debian releases and deciding to upgrade
-
Mar 25, 2016:
(Debian) Setting environment variables
-
Mar 11, 2016:
(LXDE) Monitoring battery life
-
Mar 9, 2016:
(LXDE) Customizing key bindings
-
Mar 8, 2016:
(LXDE) Customizing the log in background
-
Mar 8, 2016:
Adding a new sudo user
-
Mar 8, 2016:
Starting out on Debian
programming-languages (10)
-
Aug 9, 2020:
Choosing a logging library for Kotlin or Java AWS Lambda functions
-
Aug 9, 2019:
JDK distributions, JDK distributions everywhere
-
Aug 5, 2017:
Enabling regular expressions in SQLite with Rails
-
Dec 18, 2016:
Golang channels
-
Oct 10, 2016:
Visualizing data in Matlab
-
Sep 3, 2016:
Functional programming ideas in object-oriented languages
-
Jul 17, 2016:
Using JQuery to show or hide related elements
-
May 3, 2016:
Concurrency is beautiful with the Go programming language
-
May 1, 2016:
(Linux) Setting up Ruby on Rails using RVM
-
Apr 30, 2016:
Ruby on Rails not so slow on Unix
security (10)
-
Nov 25, 2019:
Setting up secure AWS S3 buckets with CloudFormation
-
Nov 18, 2019:
Diving into the Essential Eight strategies to mitigate security incidents part 2: limiting blast radius and recovering
-
Aug 30, 2019:
Diving into the Essential Eight strategies to mitigate security incidents part 1: preventing delivery and execution of malware
-
Aug 25, 2019:
Top mitigation strategies from the Australian Cyber Security Centre
-
May 25, 2018:
Diving into information security principles
-
Jul 12, 2017:
Setting HTTP security headers in Rails
-
Jun 25, 2017:
What's risk management?
-
May 19, 2017:
Improving authentication usability
-
Mar 8, 2017:
Hash functions for cryptography versus look-up
-
Jun 25, 2016:
Security Engineering, by Ross Anderson
software-development (2)
system-design (2)