I have my own Pragmatic Investment Plan that I’ve been (remarkably slack) in following. It’s the first one I’ve done and it covers a whole year. Which I’m starting to think is a mistake. My circumstances have changed a fair bit since I wrote that PiP and a number of the tasks, such as learn Mono and write a CPAN module, are no longer very relevant to me and where I’m heading; although the fact I couldn’t pick goals that were valid for a whole year might say something about me :). Read on →
Over in my Pragmatic Investment Plan I have two items under the topic of vanity. To put something on my site worth reading and to get my site into the first 100 results returned by google. Once my traffic hit a 100,000 unique (not obviously bots) visitors in under three months I considered the first one fulfilled. I’m now, and I realise how sad this is going to sound, very happy to report that at least for this very moment unixdaemon.net is in the top hundred results for the search phrase Dean; 99th to be exact. Read on →
Most people know you can change the readline settings to either vi or emacs style key-bindings, but far less people know you can actually open the current, or a previous, command line in your editor of choice using ‘fc’. If you type ‘fc’ on the command line then the previous command will be open in the defined editor; if you want to select a further back command you can use ‘fc pattern’. Read on →
Mind Hacks is an O’Reilly book that examines specific operations of the brain and presents simple experiments (do try this at home :)) to illustrate how it works and how, occasionally, you can fool it. O’Reilly and Foyles held a join event in the Foyles gallery in London where they had both of the books main authors do a short introduction to the topic and explain what the book was about. Read on →
There were three talks at the March GLLUG and I can now happily link to slides from two of them. Bruce Richardson’s Linux HA and Martin Michlmayr’s Quality Issues in Free Software projects. Hopefully these will soon be linked to on the GLLUG website. The first talk of the day, by Pete Ryland, involved a live demo and no slides so there isn’t really anything to link to on that one; until we get the audio recordings sorted anyway.
F-Secure has released a blacklight beta download that is available in both GUI and command-line versions. The full Blacklight details are now online and after a quick play it seems pretty nifty, and most importantly, has a command-line version for automated deployment and scanning. One to watch when it goes gold.
Update: I was completely wrong about the cards being binary. Please see my jMemorize retraction for details. I saw a piece on jMemorize over at unixreview and decided to have a little play. Quick download, runs from the Jar, OK GUI. Not bad on a cursory glance. I then built a small set of cards as a sample and had a play. Finishing off I saved the card stack and decided to have a look at the file it created, I’d like to generate my flash-cards from existing docs I have so an easy to write format would be excellent. Read on →
I stumbled on to the site for Danger - Quicksand - Have A Nice Day through one of the other blogs I read and after reading the first couple of pages was sucked in. The book doesn’t cover anything really ground breaking but where it caught me was pointing out scenarios that I’ve been in and showing that I’m not the insane one for thinking they were odd or out of place. Read on →
Between being ill, attending FOSDEM, putting a GLLUG on, actually reviewing my review copies of books and a couple of other bits I can’t yet mention, the things requiring my attention have been not-so-slowly piling up. I’ve taken a large chunk of this weekend to clear down the multiple mail boxes, RSS feeds and saved book-marks that I was supposed to read weeks ago. One thing I have noticed is how much more productive I am when using client-side tools I can customise. Read on →
Tom Liston wrote up an excellent (and scary!) analysis of what happens to an unpatched machine when it goes to a less than reputable site. The full details, part 1, part 2, part 3 and part 4 are well worth a read. You’ll be stunned at how much shite comes down from a single executable that the user never even gets a choice whether to run.