08 Feb 21
Project attempting to give an opportunity to take a look at Rome from the perspective of humans who lived there in that time.
Paper discusses the security implications of how social media has made it possible to manipulate the masses by considering an attack scenario in which an adversary attempts to manipulate the behavior of energy consumers by sending fake discount notifications encouraging them to shift their consumption into the peak-demand period.
A look at how Chrome ad blocking extensions affect CPU usage, page rendering, and browser memory consumption.
13 Jan 21
Avatar generator coded in vanilla JavaScript. Only a single library (SHA-256) is used, integrated into the script. The initial character designs in SVG are also integrated into the script. So there is a single dependency-free JavaScript file that has everything in it (minified 68 KB).
08 Jan 21
Article highlighting that Tail Call Optimization is also applicable in non-recursive contexts.
07 Jan 21
Author describes how he decoded (most of) the protocol that the Peloton bike uses to communicate with its head unit tablet and built a device, that takes that data during a ride and broadcasts it over Bluetooth LE for other devices to consume.
05 Jan 21
Thoughts on what sets repl-driven development apart from mere development with a repl.
04 Jan 21
Introduction to the technique (known as “dithering”) used for the graphics of the game: “Return of the Obra Dinn”.
How to setup DNS records to ensure that domains that do not send email cannot be used for spoofing.
23 Dec 20
21 Dec 20
Hands Down is specifically designed for small split ergo keyboards with a deliberate thumb cluster and column stagger. It aims to improve comfort and performance by reducing hand movement away from home row even for shift, ctrl/cmd, alt, as well as for layers such as navigation, numbers, fn-keys, media keys, etc.
18 Dec 20
How to establish a peer-to-peer connection between two machines, in spite of all the obstacles in the way.
15 Dec 20
11 Dec 20
09 Dec 20
Smart devices manufacturers often “hard-code” in a public DNS server, like Google’s 8.8.8.8, and their devices ignore whatever DNS server is assigned by the router. Fortunately, with a few simple firewall rules, you can intercept these hardcoded DNS queries and redirect them to your DNS resolver. These instructions are for pfSense, but can be adapted to other firewall/routers.
08 Dec 20
This guide covers various ways to make hexagonal grids, the relationships between different approaches, and common formulas and algorithms. Most parts of this page are interactive.
04 Dec 20
An educational puzzle game. Solve a series of tasks where you build increasingly powerful components. Starts with the simplest logical components and ends up with a programmable computer.