crypto currencies Is Bitcoin a store of value? There's been a lot of talk recently over switching to BTC from fiat money as cryptocurrencies are now store of value. Is this actually true? Depends.
crypto currencies Bitcoin, how does it work? The current trend is to dumb down the mechanics of Bitcoin behind multiple levels of abstraction. Here we explore how it actually works without generalizing too much.
hack LG Washer keeps dropping wifi connection, solved! * April 2021 edit (six months without issue) * August 2021 edit (finally crashed!) * November 2022 edit (minor flood) After a dreadful experience with a Bosh dishwasher and a great with an
utilities SystemRescueCD 6.1.x and SSHD Your hard-drive's dying as soon as it gets out of the factory. Bit by bit, sector by sector. Don't postpone backups, but when disaster strikes, SystemRescueCD may go a long way!
java Java and how to deal with the singular plural form Plurals look easy. One hand, two hands. And then you stumble on apophonic plurals, and one foot becomes two feet.
Google Picasa, if it ain't broke... For my personal taste Google hit the absolute sweet spot with Picasa: * light on resources * snappy * didn’t mess with original images * stored modifications in a sensible way * amazing face detection So much so that I never looked back. I must confess that every
Gigabyte AM4 - X570 AORUS Pro crashes on sleep I’ve recently upgraded my workstation: * Motherboard Gigabyte SktAM4 – X570 AORUS PRO * AMD Ryzen 5 3600 3.6Ghz HexaCore SktAM4 * RAM 2x 16GB (32GB) DDR4 Kingston CL16 3200Mhz HyperX FURY RGB Black * GPU Asus GeForce® RTX 2060 DUAL EVO ADVANCED 6GB * SSD Samsung 970
Cygwin Created File - Cannot Delete If you open permissions on file/folder and get this message: > Permissions Are Incorrectly Ordered And if you list files in cygwin and the user:group looks like this: [waste@server /cygdrive/e/folder_with_bad_permissions]# ll total 172K drwxr-x---+ 1 Unknown+User
java Maven, Ant and sbt, how to pull from a local SSL repo? Learn how to configure Java to work with your internal self-signed SSL certificate and configure Maven, Ant+Ivy and sbt to pull from the local SSL repository.
ssl Apache Archiva behind HAProxy with SSL termination Apache Archiva is free open-source build artifact repository.
ssl SSL for company internal services A quick guide on how to create valid SSL certificates for your internal servers and put them to use within Spring Boot or HAProxy.
haproxy HAProxy with SSL, without root and no OpenSSL installed? So you have an account as a regular linux user and you want to install HAProxy with SSL on a system that doesn’t have OpenSSL. To make matters worst
utilities The `ls` command is hard-wired into your brain, how to make it work in windows? What I generally do is to create a folder with my personal commands, then I add that folder to the PATH. To change the “environment variables” for your account just
How to install that *.msi as a non administrator? There are a lot of times when you don’t actually need admin privileges to install that bundled-up *.msi. Take AdoptOpenJDK binaries for instance. You can simply run: msiexec.exe /i OpenJDK11U-jdk_x64_windows_hotspot_11.0.7_10.msi INSTALLDIR=%USERPROFILE%\AdoptOpenJDK\jdk-11.
drivers Intel DZ77BH-55K Motherboard - Drivers If you install Windows 10 on this motherboard and activate AHCI everything will work out of the box but some HDD models will disconnect (sometimes) when Windows puts them to
backup Restore, Backup's Ugly Duckling If you don't test it regularly, you'll never know if it's working.
backup Backups Done Right 2023 EDIT: While this post was mostly about how to migrate from Crashplan to a proper backup, it's still very relevant on how to do 3-2-1 backups. I always had
security Massively Distributed Spear Phishing The difference between phishing and spear phishing is precisely that the latter targets a specific individual making the subject of this post – massively distributed spear phishing – particularly convoluted. The thing
privacy Cookie in the Jar Privacy. Few words seem more ubiquitous in this day and age. When we started the joyride the world was a different beast; nowadays the TV is tracking you, the refrigerator
programming Message in a Bottle Code, just as language or sound, is another way to communicate a message. You make use of a system of rules to convey an intention. Not just to the computer, also to yourself.