Rob Janssen

All | Unread | Read

Best 15 Unix Command Line Tools

Here are some of the unix command line tools which we feel make our hands faster and lives easier. Let’s go through them in this post and make sure to leave a comment with your favourite!

Why I left Mac for Windows: Apple has given up

If you ask anyone who knows me, I’m probably the biggest Apple fan they know. Ask for a suggestion of what computer to get, and I’ll almost certainly either tell you the MacBook Pro, or to wait, because Apple is about to update its hardware finally.

A Programmer’s Introduction to Unicode – Nathan Reed’s coding blog

Unicode! ???????? ?????????????! ? The very name strikes fear and awe into the hearts of programmers worldwide.

Let’s Corrupt a SQL Server Database Together, Part 1: Clustered Indexes

Hold my beer. Now, let’s corrupt it. Open it with a hex editor – my personal favorite is the free xvi32 because it doesn’t require installation. Just download it, fire it up (you’ll want to run it as administrator), and open the database’s MDF file:

Behavioral Design Patterns

It is concerned with assignment of responsibilities between the objects. What makes them different from structural patterns is they don't just specify the structure but also outline the patterns for message passing/communication between them.

How do .NET delegates work?

Delegates are a fundamental part of the .NET runtime and whilst you rarely create them directly, they are there under-the-hood every time you use a lambda in LINQ (=>) or a Func<T>/Action<T> to make your code more functional.

The 68 things the CLR does before executing a single line of your code (*)

Because the CLR is a managed environment there are several components within the runtime that need to be initialised before any of your code can be executed. This post will take a look at the EE (Execution Engine) start-up routine and examine the initialisation process in detail.

RFC 6143 The Remote Framebuffer Protocol March 2011

Internet Engineering Task Force (IETF) T. Richardson Request for Comments: 6143 J. Levine Category: Informational RealVNC Ltd.

Efficient game updates

A little while ago, I wrote an article on things that can go wrong when downloading, it listed a series of reasons, from network problems to invalid content to imperfect hardware that may occur when initially installing a game.

3 Security Headers That Every Site Should Have

Clickjacking, XSS and CSRF, exploits that have been around for 15+ years now and still form the basis for many vulnerabilities on the web today.

This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.

This list is compiled from my Pocket list.