background preloader

Random things

Facebook Twitter

Keycloak. Docker in Production: An History of Failure – The HFT Guy. My first encounter with docker goes back to early 2015.

Docker in Production: An History of Failure – The HFT Guy

Docker was experimented with to find out whether it could benefit us. At the time it wasn’t possible to run a container [in the background] and there wasn’t any command to see what was running, debug or ssh into the container. The experiment was quick, Docker was useless and closer to an alpha prototype than a release. Fast forward to 2016. New job, new company and docker hype is growing like mad.

We have 12 dockerized applications running in production as we write this article, spread over 31 hosts on AWS (1 docker app per host). Noto Fonts. Chroma.js Color Scale Helper. Ebde50. Click to copy colllor about share Free graph / lined / dot paper generator Copied Working results for: #ebde50 HomeAboutContact© 2016 - colllor.com sponsor footer #ebde50 #dfde52 #d4df55 #c9e058 #bee15b #b3e25e.

ebde50

Massivedynamic/openftp4: A list of all FTP servers in IPv4 that allow anonymous logins. Oh, shit, git! ColorBrewer: Color Advice for Maps. GitHub - blackthorne/Codetective: a tool to determine the crypto/encoding algorithm used according to traces from its representation. Text to Decimal — Cryptii. Alphabet TextThe quick brown fox jumps over 13 lazy dogs.

Text to Decimal — Cryptii

Flipped.sgod yzal 31 revo spmuj xof nworb kciuq ehT HTML EntitiesThe quick brown fox jumps over 13 lazy dogs. Morsecode- .... . / --.- ..- .. -.-. -.- / -... .-. --- .-- -. / ..-. --- -..- / .--- ..- -- .--. ... / --- ...- . .-. / .---- ...-- / .-.. .- --.. -.-- / -.. --- --. ... LeetspeakT/-/e 0,[_]i(|{ b|? Fuck Off As A Service (FOAAS) GitHub - json-porn-api/demo: Demo client for the JSON Porn API.

Instant Logo Search. Scott Hanselman's 2014 Ultimate Developer and Power Users Tool List for Windows. Agréger plusieurs connexions ADSL grâce à OverTheBox. Alors là, je dis bravo OVH, c'est du bon boulot !

Agréger plusieurs connexions ADSL grâce à OverTheBox

En effet, lors de l'OVH Summit qui a lieu actuellement, le premier hébergeur français (Européen, je crois ?) A dévoilé OverTheBox, un boitier qui permet d'agréger plusieurs connexions Internet afin de multiplier le débit. Cela permet de répartir la charge ADSL sur plusieurs connexions (load balancing) et d'être résistant à la coupure de net si vous avez différents FAI (Fail Over). Waifu2x. AlessandroZ/LaZagne. Motherfucking Website.

Une IA de Google décrit avec précision le contenu de photos ! Jusqu'à présent, on connaissait les outils de reconnaissance faciale qui permettent de repérer et d'identifier les visages apparaissant sur une photo.

Une IA de Google décrit avec précision le contenu de photos !

Ce type de technologie est par exemple très prisé par les réseaux sociaux comme Facebook. Ce dernier s'en sert en particulier pour suggérer à ses utilisateurs de marquer leurs proches lorsqu'ils envoient des clichés dans lesquels ces derniers apparaissent. Mais il y a beaucoup plus impressionnant : ce sont les outils qui sont capables d'analyser le contenu d'une photographie et d'en faire une description très fidèle. UnlawfulPaleGnat. How I reverse-engineered Google Docs to play back any document's keystrokes « James Somers (jsomers.net) If you’ve ever typed anything into a Google Doc, you can now play it back as if it were a movie — like traveling through time to look over your own shoulder as you write.

How I reverse-engineered Google Docs to play back any document's keystrokes « James Somers (jsomers.net)

This is possible because every document written in Google Docs since about May 2010 has a revision history that tracks every change, by every user, with timestamps accurate to the microsecond; these histories are available to anyone with “Edit” permissions; and I have written a piece of software that can find, decode, and rebuild the history for any given document. See that little gizmo above? It’s like a video player, but made especially for writing. Un gros Troll de plus sur Javascript. Un commentaire très pertinent de Kontre m’a interpellé dernièrement : si Javascript est si pourri, pourquoi tout le monde s’y intéresse ?

Un gros Troll de plus sur Javascript

20 Questions

Emoji unicode characters for use on the web. Apps.timwhitlock.info Emoji Unicode Tables The following tables show commonly-supported Emoji that map to standardized Unicode characters.

Emoji unicode characters for use on the web

Reset The Net - Privacy Pack. How to fix limited or no connectivity Wi-Fi issues in Windows 8. What happens when Windows 8 or 8.1 shows the following arcane message whenever you try to connect to your wireless network: This connection has limited or no connectivity.

How to fix limited or no connectivity Wi-Fi issues in Windows 8

Computrace - Le mouchard universel présent sur les PC, Mac et appareils Android. Et si je vous disais qu'il y a dans votre ordinateur un mouchard que vous ne pouvez pas enlever, qui a été mis en place par le constructeur, qui est sur les listes blanches de la plupart des antivirus et dont vous n'avez jamais entendu parler ?

Computrace - Le mouchard universel présent sur les PC, Mac et appareils Android

La société Kaspersky, spécialisée dans la détection et l'élimination de malware a débusqué il y a quelques mois un logiciel installé sur plus de 2 millions d'ordinateurs de par le monde qui est commercialisé par la société Absolute et qui permet OFFICIELLEMENT : De sécuriser les données d'un parc de postes à distanceDe déployer toujours à distance des mises à jour, des licences ou de lancer des auditsDe géolocaliser des ordinateurs volésDe produire des rapports concernant les machinesDe récupérer des fichiersD'effacer à distance des documents ou tout le disque dur Et qui est OFFICIEUSEMENT un trou béant dans la sécurité de votre ordinateur, car il peut être utilisé par un attaquant pour faire ce qu'il veut sur votre PC.

Online graphing calculator and function plotter. RegExr: Learn, Build, & Test RegEx. Heartbleed Bug. Test your server for Heartbleed (CVE-2014-0160) If there are problems, head to the FAQ Results are now cached globally for up to 6 hours. Enter a URL or a hostname to test the server for CVE-2014-0160. All good, seems fixed or unaffected! Uh-oh, something went wrong: Check what it means at the FAQ. It might mean that the server is safe, we just can't be 100% sure! Critical crypto bug in OpenSSL opens two-thirds of the Web to eavesdropping. For a more detailed analysis of this catastrophic bug, see this update, which went live about 18 hours after Ars published this initial post.

Svn cleanup failed–previous operation has not finished; run cleanup if it was interrupted. August 1, 2013 Anuj Varma svn cleanup failed–previous operation has not finished; run cleanup if it was interrupted All content on this site is original and owned by anujvarma.com. Specializing in high volume web applications, Anuj Varma has helped architect, re-architect and troubleshoot some of the largest web applications out there. His customer base includes Fortune 100 companies ( British Petroleum, dell.com, Schlumberger) as well as smaller to mid size firms within the United States. He can also be found on – technicalarchitect.us. Spreadsheet Service - Google Apps Script. Spreadsheet This service allows scripts to create, access, and modify Google Sheets files. See also the guide to storing data in spreadsheets. Classes. CodeCombat.

Historique des positions Google. How the Bible and YouTube are fueling the next frontier of password cracking. Early last year, password security researcher Kevin Young was hitting a brick wall. Over the previous few weeks, he made steady progress decoding cryptographically protected password data leaked from the then-recent hack of intelligence firm Stratfor. But with about 60 percent of the more than 860,000 password hashes cracked, his attempts to decipher the remaining 40 percent were failing. Daily learnings. Minecrafting with OS OpenData. We have created GB Minecraft 2, a Minecraft® world made with digital map products – freely available as OS OpenData™. The world consists of more than 83 billion blocks representing over 220,000 square kilometres of mainland Great Britain and surrounding islands. We don't include Northern Ireland, the Channel Islands or the Isle of Man because they are mapped by other organisations.

Take a look at our Developer Centre for lots more information on the data, tools and other resources we offer. Requirements A licensed copy of Minecraft. 23GB free disk space. Gaupol Subtitle Editor. Gaupol is an editor for text-based subtitle files. It supports multiple subtitle file formats and provides means of creating subtitles, editing texts and timing subtitles to match video. The user interface is designed with attention to batch processing of multiple documents and convenience of translating. Gaupol should run on all Unix-like (GNU/Linux, *BSD, Solaris, etc.) operating systems and on Windows. Technically, it should run on Mac as well, but that has not been tested nor made convenient. The beginners guide to breaking website security with nothing more than a Pineapple. You know how security people get all uppity about SSL this and SSL that?

Stuff like posting creds over HTTPS isn’t enough, you have to load login forms over HTTPS as well and then you can’t send auth cookies over HTTP because they’ll get sniffed and sessions hijacked and so on and so forth. This is all pretty much security people rhetoric designed to instil fear but without a whole lot of practical basis, right? That’s an easy assumption to make because it’s hard to observe the risk of insufficient transport layer protection being exploited, at least compared to something like XSS or SQL injection. But it turns out that exploiting unprotected network traffic can actually be extremely simple, you just need to have the right gear.

Say hello to my little friend: This, quite clearly, is a Pineapple. Bayesian Methods for Hackers. An intro to Bayesian methods and probabilistic programming from a computation/understanding-first, mathematics-second point of view. Prologue The Bayesian method is the natural approach to inference, yet it is hidden from readers behind chapters of slow, mathematical analysis. The typical text on Bayesian inference involves two to three chapters on probability theory, then enters what Bayesian inference is.

Unfortunately, due to mathematical intractability of most Bayesian models, the reader is only shown simple, artificial examples. New AWS Command Line Interface (CLI) Why I Dislike EC2. Every now and again I tweet about my dislike for EC2. People always ask why. Open Source Game Clones. Practical, Visual, Three-Dimensional Pedagogy for Internet Protocol Packet Header Control Fields. Practical, Visual, Three-Dimensional Pedagogy for Internet Protocol Packet Header Control Fields June 27, 2010. Solved Windows 8 Wifi Help. YouTube Options - a browser extension. Buffer speed, size and video size on YouTube. Layervault/psd.rb. 10 Easy Steps to a Complete Understanding of SQL. Too many programmers think SQL is a bit of a beast. It is one of the few declarative languages out there, and as such, behaves in an entirely different way from imperative, object-oriented, or even functional languages (although, some say that SQL is also somewhat functional).

I'm writing SQL every day and embracing SQL with my Open Source Software jOOQ. Learn Go in Y Minutes.