Tullio Facchinetti
Tag cloud
Picture wall
Daily
RSS Feed
  • RSS Feed
  • ATOM Feed
  • Daily Feed
Filters

Links per page

  • 20 links
  • 50 links
  • 100 links

Display

Filter untagged links
page 1 / 37
733 results tagged article  ✕
Command Line Interface Guidelines https://clig.dev/
Mon 07 Dec 2020 07:07:56 PM CET
QRCode
#cli-app 5_stars article command_line guidelines
Stasi - Dcouments on tools and devices used by the Stasi service https://www.cryptomuseum.com/intel/stasi/index.htm
Mon 26 Oct 2020 08:03:27 AM CET
QRCode

article story
Linux terminal trick: Hack the cd command to remember where you've been https://www.redhat.com/sysadmin/cd-command
Sat 19 Sep 2020 09:59:04 PM CEST
QRCode

Be more efficient with this Linux directory navigation trick.

article command_line linux sysadmin
File Transfer with SSH, Tee, and Base64 https://susam.in/blog/file-transfer-with-ssh-tee-and-base64/
Thu 17 Sep 2020 05:47:22 PM CEST
QRCode
article file_transfer SSH tips
How to manage passwords with pass https://gador.github.io/how-to-manage-passwords-with-pass.html
Wed 16 Sep 2020 09:37:07 PM CEST
QRCode

Well, if you found this page and are interessed in pass, you must already have your reasons to look into password managers. For me, it's a basic concept: Use password only once. Don't (ever) reuse passwords or passphrases for other services. If one service gets compromised, you won't automatically have to worry about your other services. This makes remembering passwords a bitch, especially if you don't iterate through numbers of your favorite, easy-to-guess, passwords. Speaking of which, yes, there are tools out there, that can generate very good dictionaries based on a bit of social engineering. So you really should use generated passwords.

article blog linux manager password software
Improve your time management with Jupyter https://opensource.com/article/20/9/calendar-jupyter
Tue 15 Sep 2020 07:05:43 PM CEST
QRCode

Python has incredibly scalable options for exploring data. With Pandas or Dask, you can scale Jupyter up to big data. But what about small data? Personal data? Private data? [JupyterLab and Jupyter Notebook provide a great environment to scrutinize my laptop-based life.

article jupyter python tools
Troy Hunt: We Didn't Encrypt Your Password, We Hashed It. Here's What That Means: https://www.troyhunt.com/we-didnt-encrypt-your-password-we-hashed-it-heres-what-that-means/
Sat 05 Sep 2020 03:58:23 PM CEST
QRCode

You've possibly just found out you're in a data breach. The organisation involved may have contacted you and advised your password was exposed but fortunately, they encrypted it. But you should change it anyway. Huh? Isn't the whole point of encryption that it protects data when exposed to unintended parties?

article security story
Massacring C Pointers https://wozniak.ca/blog/2018/06/25/1/index.html
Sat 05 Sep 2020 03:49:07 PM CEST
QRCode
article c programming
E-mail gateways and gatekeeping | Something witty yet insightful https://www.labbott.name/blog/2020/09/01/emailgateway.html
Fri 04 Sep 2020 10:30:41 AM CEST
QRCode

So The Register managed to incite a lot of discussion with a headline that plain-text e-mail is a barrier to entry for kernel development. While attention grabbing, this is actually not a new debate. Like a lot of tech arguments this one seems to come up on a cyclical basis. Maybe because maintainer summit didn’t happen this year it needed to come out elsewhere. I gave a few thoughts on twitter but this topic really deserves a longer look at the problem and what e-mail being a barrier really means.

article kernel linux opinion
Why You Should Be Using Persistent SSH Sessions https://software.rajivprab.com/2019/07/14/ssh-considered-harmful/
Mon 17 Aug 2020 01:10:23 PM CEST
QRCode

No, there hasn’t been any new vulnerability found in SSH, nor am I denying the usefulness of SSH as a building block in the dev toolchain. This article is about why you shouldn’t be (and how you can avoid) using raw SSH sessions for development work.

In summary, how the author discovered screen, tmux, etc.

article communication security ssh tmux tools
The matrix calculus you need for deep learning https://explained.ai/matrix-calculus/
Mon 17 Aug 2020 01:07:16 PM CEST
QRCode

Most of us last saw calculus in school, but derivatives are a critical part of machine learning, particularly deep neural networks, which are trained by optimizing a loss function. This article is an attempt to explain all the matrix calculus you need in order to understand the training of deep neural networks. We assume no math knowledge beyond what you learned in calculus 1, and provide links to help you refresh the necessary math where needed.

article deep_learning math tutorial
fucking-algorithm at english https://github.com/labuladong/fucking-algorithm/tree/english
Sun 16 Aug 2020 06:20:06 PM CEST
QRCode

Crack LeetCode, not only how, but also why.

algorithm article collection
Web by Google (TM) https://landshark.io/2020/08/16/web-by-google.html
Sun 16 Aug 2020 06:06:54 PM CEST
QRCode
article opinion tech web
8 Best Free Vim-Like Text Editors https://www.linuxlinks.com/best-free-vim-like-text-editors/
Sun 16 Aug 2020 09:54:37 AM CEST
QRCode

Text editors remain a controversial area. Here's our recommended Vim-like text editors. They are all released under an open source license.

article editor list software vim
Using Askgit https://willschenk.com/articles/2020/using_askgit/
Sun 16 Aug 2020 09:44:12 AM CEST
QRCode

askgit provides a sql interface to your git repository.

article command_line git software tutorial versioning
Stopping phishing campaigns with bash https://blog.haschek.at/2020/stopping-phishing-campaigns-with-bash.html
Thu 13 Aug 2020 09:05:08 PM CEST
QRCode

How to poison phishing sites with fake data.

article online programming security
7 System Monitoring Tools for Linux That are Better Than Top https://itsfoss.com/linux-system-monitoring-tools/
Tue 11 Aug 2020 09:32:00 PM CEST
QRCode

Top command is good but there are better alternatives to Top. Take a look at these system monitoring tools that are similar to top but are actually better.

article comparison list monitoring software tools
whowatch - Monitor Linux Users and Processes in Real Time https://www.tecmint.com/whowatch-monitor-linux-users-and-processes-in-real-time/
Sun 09 Aug 2020 09:28:07 PM CEST
QRCode

whowatch is a simple, easy-to-use interactive who-like command line program for monitoring processes and users on a Linux system in real time.

#cli-app article linux opensource software sysadmin
Google 'BigBird' Achieves SOTA Performance on Long-Context NLP Tasks | Synced https://syncedreview.com/2020/08/03/google-bigbird-achieves-sota-performance-on-long-context-nlp-tasks/
Mon 03 Aug 2020 10:13:43 PM CEST
QRCode

BigBird is shown to dramatically improve performance across long-context NLP tasks, producing SOTA results in question answering and summarization.

article NLP research
DeepDream: How Alexander Mordvintsev Excavated the Computer’s Hidden Layers | The MIT Press Reader https://thereader.mitpress.mit.edu/deepdream-how-alexander-mordvintsev-excavated-the-computers-hidden-layers/
Mon 03 Aug 2020 10:10:41 PM CEST
QRCode

A Google researcher looks into the mind of a computer.

article deep_learning research tech
page 1 / 37
3654 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community - Theme by kalvn