If I hash passwords before storing them in my database, is that sufficient to prevent them being recovered by anyone? Of course any form of hash will not prevent those attacks.My Logging Practices
There are many classic tech debates, and the question of what to formally call web addresses is one of the most nuanced. The way this normally manifests is someone asks for the “URL” to put into his or her browser, and someone perks up with,Linux utils that you might not know
I’ve used Linux as my primary operating system for well over ten years, yet I still stumble upon things that are completely unknown to me. For example, several days ago, I wanted to display a formated table in my terminal.Reckon you've seen some stupid security things? Here, hold my beer...
Naturally, I passed it on because let's face it, that's some crazy shit going on right there. To which the Twitters responded with equal parts abject horror and berating comments for not having already identified this as a joke circulating on Reddit. But here's the thing - it's feasible.SOLID Principles in a glance
If you are making changes to the same Class for different type of requirements you are doing it wrong. Code should be open for extension and closed for modification.95% engineers in India unfit for software development jobs, claims report
NEW DELHI: Talent shortage is acute in the IT and data science ecosystem in India with a survey claiming that 95% of engineers in the country are not fit to take up software development jobs. According to a study by employability assessment company Aspiring Minds, only 4.The 640 K Barrier
There was a demon in memory. They said whoever challenged him would lose. Their programs would lock up, their machines would crash, and all their data would disintegrate. The demon lived at the hexadecimal memory address A0000, 655,360 in decimal, beyond which no more memory could be allocated.(Kinda.)
Luckily, I know this about myself. This allows me to consciously engineer my life so that despite having the emotional maturity of a heroin-addicted lab rat, I’m occasionally able to get things done. I waste a lot of time on Reddit.Ten SQL Server Functions That You Hardly Use But Should
In order to see what rows are in table 1 and not in table 2 and vice versa you can do 2 left joins, 2 right joins or 1 left and 1 right join. To get the rows that are different you can use BINARY_CHECKSUM.
This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.
This list is compiled from my Pocket list.