Bookmark
Creative usernames and Spotify account hijacking | Spotify Labs
labs.spotify.com/2013/06/18/creative-usernames/, posted 2013 by peter in development security unicode webdesign
Spotify supports unicode usernames which we are a bit proud of (not many services allow you to have ☃, the unicode snowman, as a username). However, it has also been a reliable source of pain over the years. This is the story of one time when it bit us pretty badly and how we spent Easter dealing with it.
Bookmark
Sitespeed.io - Analyze your website speed and performance
sitespeed.io/, posted 2013 by peter in development download free statistics testing webdesign
Sitespeed.io is an open source tool that helps you analyze and optimize your website speed and performance based on performance best practices. It collects data from multiple pages on your website, analyze the pages using performance best practices rules and output the result as HTML-files or JUnit XML.
Bookmark
Malone Dot CC · LHBS #1: Intro
malone.cc/posts/lhbs_1.html, posted 2013 by peter in development hack humor
I'm bored. Let's build an entire programming environment around Brainfuck. [...] Why do any of this? Because it's fun, duh. Because re-inventing something is the best way to learn about that something. Also because I don't feel like making websites right now. Stay tuned for more updates.
Bookmark
cortesi - How mitmproxy works
corte.si/posts/code/mitmproxy/howitworks/index.html, posted 2013 by peter in communication development free hack networking reference security software
The text below is now part of the official documentation of mitmproxy. It's a detailed description of mitmproxy's interception process, and is more or less the overview document I wish I had when I first started the project. I proceed by example, starting with the simplest unencrypted explicit proxying, and working up to the most complicated interaction - transparent proxying of SSL-protected traffic1 in the presence of SNI.
Bookmark
Archive of Interesting Code
www.keithschwarz.com/interesting/, posted 2013 by peter in c++ development java list reference
The Archive of Interesting Code is an (ambitious) effort on my part to research, intuit, and code up every interesting algorithm and data structure ever invented. In doing so, I hope both to learn the mathematical techniques that power these technologies and to improve my skills as a programmer.
Bookmark
Most data isn’t “big,†and businesses are wasting money pretending it is – Quartz
qz.com/81661/most-data-isnt-big-and-businesses-are-wasting-money-pretending-it-is/, posted 2013 by peter in business development opinion statistics
Biases in how data are collected, a lack of context, gaps in what’s gathered, artifacts of how data are processed and the overall cognitive biases that lead even the best researchers to see patterns where there are none mean that “we may be getting drawn into particular kinds of algorithmic illusions,” said MIT Media Lab visiting scholar Kate Crawford. In other words, even if you have big data, it’s not something that Joe in the IT department can tackle—it may require someone with a PhD, or the equivalent amount of experience. And when they’re done, their answer to your problem might be that you don’t need “big data” at all.
Bookmark
Two.js
jonobr1.github.io/two.js/, posted 2013 by peter in development free graphics software webdesign
Two.js is a two-dimensional drawing api geared towards modern web browsers. It is renderer agnostic enabling the same api to draw in multiple contexts: svg, canvas, and webgl.
Go is an open source programming language designed for building simple, fast, and reliable software. Go by Example is a hands-on introduction to Go using annotated example programs. Check out the first example or browse the full list below.
Bookmark
Magnific Popup: Responsive jQuery Lightbox Plugin
dimsemenov.com/plugins/magnific-popup/, posted 2013 by peter in development free javascript opensource software webdesign
Magnific Popup is a free responsive jQuery lightbox plugin that is focused on performance and providing best experience for user with any device (Zepto.js compatible).
Bookmark
Secure Your REST API... The Right Way | Stormpath
https://www.stormpath.com/blog/secure-your-rest-api-right-way, posted 2013 by peter in development howto security
We already showed you how to build a Beautiful REST+JSON API, but how do you secure your API? At Stormpath we spent 18 months researching best practices, implementing them in the Stormpath API, and figuring out what works. Here’s our playbook on how to secure a REST API.
|< First < Previous 149–158 (528) Next > Last >|