Sounds like atop is exactly what you need.
Sounds like atop is exactly what you need.
False. Everyone can opt out of Facebook.
i’m pretty sure my neighbour’s dog is going to announce a new ai assistant any day now
Also, if you remember enjoying hacking, maybe pick that up again? There’s a massive shortage of security engineers at all times.
First of all, you can totally do it! The field is massive, but also full of very bad programmers, and seeing how you were able to write a coherent text of three paragraphs, that already puts you ahead of the curve. Determination and perseverance is key.
I would suggest to play to your strengths. Java is still Java. Most of the progress since the 1990s was in the libraries and tooling, which only recently have become passable. The language itself also evolved somewhat, but there’s nothing that you won’t pick up in a couple of days of working with it.
Start with [1], work through all the boxes that are unfamiliar to you, practice a little on a pet project, or an open source project, and you’ll land a job in no time.
You likely have a mental model of Subversion, so what I would suggest is to try to forget as much of it as possible first, as Git is very different.
Take a tutorial that is aimed at Git beginners, e.g. [1]. This will help you start building a new mental model as well as get first practical experience.
After that, read the official docs starting wtih the object model[2]. The reason why many people struggle to get into git, especially after using other VCS, is that it was built from the ground up, without much regard of the established conventions and terminology. Linus Torvalds once mentioned that he used his experience designing file systems when developing git.
So the object model of git is very simple, but also not intuitive. However, once you understand it, everything will start making sense, including the xkcd you’ve linked.
[1] https://gitimmersion.com/ [2] https://git-scm.com/book/en/v2/Git-Internals-Git-Objects
I didn’t use yaml much while it was gaining popularity, and therefore didn’t pay much attention. But this article really made me pay attention and now I distrust anything that uses yaml in any capacity.
https://ruudvanasseldonk.com/2023/01/11/the-yaml-document-from-hell
I have to download an app to confirm the reservation?
<three sentences not containing the answer to the question>
yes, calling it a heist specifically is extremely colourful in the wrong way
wait, you’re actually using encrypted email? Is it for work or you use it with friends/family too?
I’ve never received an encrypted email in my entire life.
One of the best TV sci fi franchises ever.
I can’t imagine how normal people use any software at all. When something doesn’t work for me, often I can figure out what could’ve gone wrong. For instance, there might be bug in the JavaScript form handler, and I can just bypass it. Or an app doesn’t invalidate its cache properly, so I just need to flush it manually.
One problem with that is that you will end up with two EFI partitions. This is not supported very well by anything, really, so you will run the risk of Windows messing with the wrong partition anyway.
I switched to Proton from Express when the latter was bought out by Kape.
Proton works perfectly so far for me. Their desktop software was a bit meh, but they’ve since improved it. Otherwise I have no notes.
Edit: it appears the PWA support in Firefox is not ideal, see responses to this comment.
Chromium is not an offshoot of Chrome, it’s more of a precursor to Chrome, and it is completely controlled by Google. As such, it will also drop support for extensions that do not support Manifest v3.
If you want to enable PWA support in Firefox, it looks like this is possible (however the experience doesn’t seem to be great, see responses to this comment): https://developer.mozilla.org/en-US/docs/Web/Progressive_web_apps/Guides/Installing
For other browser suggestions see, e.g. https://www.xda-developers.com/4-browsers-manifest-v2-ublock-origin/
Ah yes, that’s Android for ya.
Nice article!
You seem to be missing the word “by” in the table introducing threat T04. Also, the threat summary table uses ✅ and ❌ in a way that was counterintuitive to me: initially I thought ✅ meant the encryption approach protects against the threat.
A bigger issue IMO is how you describe email encryption in transit as a matter of fact, but according to Google transparency report[1] there are still domains that do not support in transit encryption, and, what’s worse, when you send an email you can’t tell if it will be encrypted or not.
[1] https://transparencyreport.google.com/safer-email/overview?hl=en
The T in “ninja” is silent. Silent and invisible.
They call Japan itself “Nihon”, so what do they know… /s
I don’t think it’s overhyped, at least I’ve never heard anyone hyping it up so much. I would be happy to recommend you other books if you want :)
I also don’t think it’s a big deal if you didn’t like the book. I don’t think even Knuth himself would be upset, really.