04 Jul 20

Websites that look like desktop GUIs

A curated list of websites, web apps and portfolios which resemble desktop graphical user interfaces.

02 Jul 20

Supercharge Your Elixir and Phoenix Navigation with vim-projectionist

Quick tutorial on how to use vim-projectionist plugin to better navigate Elixir projects, and more specifically ones that use the Phoenix framework.

30 Jun 20

Why Birds Can Fly Over Mount Everest

The tale of how birds evolved such an efficient respiratory system told in the style of Rudyard Kipling “Just So” stories.

27 Jun 20

The SQLite Amalgamation

Over 100 separate source files are concatenated into a single large files of C-code named sqlite3.c and called “the amalgamation”. Combining all the code for SQLite into one big file makes SQLite easier to deploy — there is just one file to keep track of. And because all code is in a single translation unit, compilers can do better inter-procedure optimization.

17 Jun 20

hashcat - advanced password recovery

An open source password recovery tool. Supported hashing algorithms include: Microsoft LM hashes, MD4, MD5, SHA-family, Unix Crypt formats, MySQL, and Cisco PIX.

12 Jun 20

Hi-Res Public Domain Art, Posters and Illustrations

Browse and download high-resolution, public domain artworks.

10 Jun 20

08 Jun 20

Grid - A Lua Game Engine

Grid is a game engine for Lua and designed for multiplayer-first game experiences.

io_uring By Example: An Article Series

This 3-part article series, explain how to use io_uring — a new high performance interface for high performance I/O for Linux — to get the most common programming tasks done under Linux.

06 Jun 20

A Story About 'Magic'

Entry from the on-line hacker Jargon File about a mysterious magic switch.

Jurassic Park Dinosaurs Illustrated with Modern Science

This article explores what we have learned about dinosaurs since the Jurassic Park films landed in the ’90s.

IBM Releases Fully Homomorphic Encryption Toolkit

The common methods of storing and sharing sensitive data with colleagues and partners have weak links. Today, files are often encrypted in transit and at rest, but decrypted while in use. This provides hackers and insiders with repeated opportunities to exfiltrate unencrypted data. FHE plugs these holes. It allows the manipulation of data by permissioned parties while it remains encrypted, minimizing the time it exists in its most vulnerable state. In conjunction with other techniques, FHE also makes it possible to selectively restrict decryption capabilities, so people can see only the portions of a file that they are entitled to, and are necessary for them to do their work.

30 May 20

A walkthrough tutorial of TLA+ and its tools: analyzing a blocking queue

A git repository that serves as a tutorial for analyzing a blocking queue implementation using TLA+, each git commit introduces a new concept.

29 May 20

Linus Torvalds: But no, 80-column terminals in 2020 isn't “reasonable” any more

Linus Torvalds on why he thinks limiting the line width of source code to 80 characters is no longer relevant.