This snippet of code can be modified and used to change the stylesheet on your page. I set it up to work against a layout extracted from Salsa, but it should work on generic pages. It's good for demos, discussions about a layout, trying different colors, etc.
I'm working on this at work - using CSS to alter Salsa's rigid layouts. :/ Yeah, it's here because I wasn't in on the issue of building backlinks.
This is yet another sendmail wrapper to help detect webmail scripts that might be spamming. It's designed for the qmail with the QMAILQUEUE path, and the qmail-qfilter filter framework.
This is one of those "why bother with an external library" moments. Mostly copied from MDN.
viudata created a Schelling Segregation Simulator in processing, and added a third race to it.
Fire up Linux. I used Ubuntu, but Debian should be similar. Ubuntu comes stock with rsyslogd. It's almost ready to go, except that it doesn't have ports open to accept rsyslog messages.
A while back, I made a little program called TPCalc to do one of my favorite mundane activities, which is to determine the best price for toilet paper at
LastPass is a password management add-on for web browsers and mobile phones.
This is a research node to find out the best ways to create email messages that contain event information, so that the user can easily create a calendar item.
The stock advice is to use .ics files, yet I don't see many event publishers using .ics files. Instead, I see people using well-formatted text, which gets automatically linked by email clients. I'll look at both methods.
It wasn't entirely clear to me how to deal with these low-cost SSL certificates like the Comodo Positive CA SSL certificate. They come to you with several CRT files.
Enforcing strong passwords is a good policy, because it increases users trust in your site. I think the same applies to 2-factor authentication.
I've avoided NTFS file permissions for the better part of two decades. First off, I'm not an enterprise admin, and secondly, it seemed like every network I came across had virtually no permissions. Unix, which has a primitive permission system, was usually more "locked down" in most cases.
Lately, though, there have been some mean malware in the wild, including one that encrypts your data, and then charges a ransom to decrypt it. Imagine that getting into your file servers. Yikes.
One corrective is to use those file permissions to protect your files from changes.
There is no great writing, only great rewriting. - Justice Brandeis
I'm not much of a Python coder, but I'm learning to be a pretty good Python re-coder.
Mobile websites all seem to have this button, which appears when you've scrolled down a bit. The button scrolls you back to the top of the page, where most of the menus reside.
Technically, you can't extend a mirrored volume, but you can break the mirror and extend it. Then, you can re-build the mirror.
Here's how to upgrade to a larger disk, using mirroring to copy the data over. I'm going to assume you want to go from a single disk to two larger disks: a spare disk is cheaper than dealing with hours of disk recovery in the event of a crash, no matter how rare crashes are.
Start by making a full backup of your disk to an external drive.
Install one new disk and making a mirror onto it.