If I hash passwords before storing them in my database, is that sufficient to prevent them being recovered by anyone? Of course any form of hash will not prevent those attacks.Exploring CQRS within the Brighter .NET open source project
There's a ton of cool new .NET Core open source projects lately, and I've very much enjoyed exploring this rapidly growing space. Today at lunch I was checking out a project called "Brighter." It's actually been around in the .NET space for many years and is in the process of moving to .My Logging Practices
There are many classic tech debates, and the question of what to formally call web addresses is one of the most nuanced. The way this normally manifests is someone asks for the “URL” to put into his or her browser, and someone perks up with,Linux utils that you might not know
I’ve used Linux as my primary operating system for well over ten years, yet I still stumble upon things that are completely unknown to me. For example, several days ago, I wanted to display a formated table in my terminal.CPU Utilization is Wrong
The metric we all use for CPU utilization is deeply misleading, and getting worse every year. What is CPU utilization? How busy your processors are? No, that's not what it measures. Yes, I'm talking about the "%CPU" metric used everywhere, by . In every performance monitoring product. In top(1).Getting Started with Headless Chrome
Headless Chrome is shipping in Chrome 59. It's a way to run the Chrome browser in a headless environment. Essentially, running Chrome without chrome! It brings all modern web platform features provided by Chromium and the Blink rendering engine to the command line. Why is that useful?Reckon you've seen some stupid security things? Here, hold my beer...
Naturally, I passed it on because let's face it, that's some crazy shit going on right there. To which the Twitters responded with equal parts abject horror and berating comments for not having already identified this as a joke circulating on Reddit. But here's the thing - it's feasible.Object Oriented Tricks: #3 Death By Arguments
OOT is a mini series on writing maintainable Object Oriented code without pulling your hair out. Click here for trick #1, trick #2. So rather than using them recklessly as conveniences, we should apply a significant amount of restraint and treat each argument as a liability.SOLID Principles in a glance
If you are making changes to the same Class for different type of requirements you are doing it wrong. Code should be open for extension and closed for modification.
This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.
This list is compiled from my Pocket list.