132 private links
Other than your Git repository storing your source code, the second most valuable source of information is your commits which chronicle the evolution of your codebase. Your commits are a treasure trove of information — when well written — because they allow you to:
- Achieve Second-Order Thinking by having the long tail of thought in order make forward thinking decisions.
- Have well thought out Code Reviews. Even better, mentorship is built in by default because your code review’s Git history allows less experienced engineers have a chance to level up and learn from more experienced engineers.
- Automate the generation of release notes and versions based on your curated commit history to produce Milestones for your team, stakeholders, and customers.
Focusing on the human element of remote software engineer productivity.
This guide describes how to tune your AMD64/x86_64 hardware and Linux system for running real-time or low latency workloads.
This is a story of how a software company was able to start a conversation with 8x more of their users by cutting the length of their emails by 90%. You could set up a test of this method in less than an hour.
So you want to learn how to secure WordPress. Congratulations! You are in good company and this post will show you all the right steps!
Having access to source code makes it possible to analyze the security and safety of applications. But if nobody actually looks at the code, the issues won’t get caught, and even when people are actively looking at code, there’s usually quite a lot to look at. Fortunately, GitHub has an active security team, and recently, they revealed a Trojan that had been committed into several Git repositories, having snuck past even the repo owners.
With zero trust, you assume everything on the network is unsafe. You have to check trust explicitly. This stance improves security throughout the SDLC.

Worried about the security of your Linux server? Learn some easy to implement tips on securing SSH and make your Linux server more secure.
This HN thread contains several tips and hints regarding methods, approaches and tools to share secrets across people and systems.
Saying no is hard, but it's also essential for your sanity.
Here are some templates for how to say no - so you can take back your life.
How to SSH properly and easily improve the security of your SSH model without needing to deploy a new application or make any huge changes to UX.