Wastholm.com

What's the number one prerequisite to building a high-quality wardrobe? Exactly: You need to be able to recognize a quality garment when you see one. You need to be able to tell the difference between a durable, well-crafted piece and one that looks pretty on the rack but won't last more than half a season. You need to know a) which properties distinguish high-quality garments from low-quality ones, and b) how to recognize these properties when you're out shopping.

To help you do just that, this post and the next one will give you a broad introduction to assessing the quality of garments. We will start with fabrics in this first part and then cover seams, tailoring, linings and details like buttons, zippers and pockets in part II. I will also include a downloadable one-page cheat sheet that summarizes the most important facts in the second post.

If you're setting up a service where people can register their own usernames to be used as a hostname (username.example.com), email address (username@example.com), or URL path (example.com/username) within your domain, there are some common names you should avoid letting the general public register.

...

This is a list of all the names I know that should be restricted from registration in automated systems. If you know of others, please let me know and I'll update this page.

In this quick tutorial I want to show you how to generate a deb package from scratch that will install a binary executable in the target system. Let's start off with a bit of theoretical background.

The SSH agent is a central part of OpenSSH. In this post, I'll explain what the agent is, how to use it, and how it works to keep your keys safe. I'll also describe agent forwarding and how it works. I'll help you reduce your risk when using agent forwarding, and I'll share an alternative to agent forwarding that you can use when accessing your internal hosts through bastions.

Avoiding hassle is especially important for a bootstrapped company. As discussed in my previous post about the spiderweb entrepreneur, in the early stages of bootstrapping, nothing happens unless YOU do it, so it’s incredibly important to conserve your time and energy.

Ifyou want to absolutely minimize hassle as you run your software business, you can stick to each one of these rules, which I present in no particular order:

DomainKeys Identified Mail (DKIM) allows a person or organisation to claim responsibility for an email message by associating a domain name with the message.

This is a guide on setting up private apt repository that is accessible over a local network via HTTPS and is signed to avoid having to use –allow-unauthenticated to install packages.

...

For my use case I have two distributions of packages, they are production and test distributions. The packages in each distribution varies based on what I have approved to be used in a live/production environment versus a test environment. This is so that I can separate out packages that I am using for normal everyday use versus ones I am currently testing with and not ready to go live with. If you are only using one distribution modify the instructions accordingly.

Most web apps need login information of some kind, and it is a bad idea to put them in your source code where it gets saved to a git repository that everyone can see. Usually these are handled by environment variables, but Docker has come up with what they call Docker secrets. The idea is deceptively simple in retrospect. While you figure it out it is arcane and difficult to parse what is going on.

The goal of this article is to provide a historical context of how JavaScript tools have evolved to what they are today in 2017. We’ll start from the beginning and build an example website like the dinosaurs did — no tools, just plain HTML and JavaScript. Then we’ll introduce different tools incrementally to see the problems that they solve one at a time. With this historical context, you’ll be better able to learn and adapt to the ever-changing JavaScript landscape going forward. Let’s get started!

In this blog post, we’ll demonstrate how the HAProxy load balancer protects you from application-layer DDoS attacks that could, otherwise, render your web application dead in the water, unreachable by ordinary users. In particular, we’ll discuss HTTP floods. An HTTP flood operates at the application layer and entails being immersed with web requests, wherein the attacker hopes to overwhelm your application’s capacity to respond.

|< First   < Previous   21–30 (234)   Next >   Last >|