Models | Examples |
---|---|
Display ads | Yahoo! |
Search ads |
# Place this file inside your ~/.idlerc/ folder | |
# or paste its contents inside | |
# /path/to/python/idlelib/config-highlight.def | |
# Adapted from SublimeText's Monokai | |
[monokai] | |
normal-foreground= #F8F8F2 | |
normal-background= #272822 | |
keyword-foreground= #F92672 | |
keyword-background= #272822 |
(by @andrestaltz)
If you prefer to watch video tutorials with live-coding, then check out this series I recorded with the same contents as in this article: Egghead.io - Introduction to Reactive Programming.
This is a guide on how to email securely.
There are many guides on how to install and use PGP to encrypt email. This is not one of them. This is a guide on secure communication using email with PGP encryption. If you are not familiar with PGP, please read another guide first. If you are comfortable using PGP to encrypt and decrypt emails, this guide will raise your security to the next level.
by Jay Baxter (circa 2009)
"This list is for people who want to become Associate Software Engineers at Blizzard. An associate should have skills at the level indicated by these books. Note that this is almost completely focused on C++ programming. This list is incomplete. I need a book on how to become a professional. I've listed several books that give examples of professional behavior, but not one on the actual training."
by Bjarne Stroustrup
We do not believe that leaving your information online means you deserve harassment, we simply wish to arm people who want to speak up with all the defensive tools available.
This guide is not an anti-government-surveillance document, as it only helps you make your information private and does not remove it. Fighting back against surveilance is a very different problem, and there is a separate guide for that.
This one should be easy, but it is the number one privacy failure wSo, you want to be a darknet drug lord... | |
by nachash | |
nachash@observers.net | |
[The advice in this article can be adapted to suit the needs of other | |
hidden services, including ones which are legal in your jurisdiction. | |
The threat model in mind is that of a drug market. The tone is that of a | |
grandfather who is always annoyingly right, who can't help but give a | |
stream-of-consciousness schooling to some whippersnapper about the way | |
the world works. If this article inspires you to go on a crime spree and |
Short version: I strongly do not recommend using any of these providers. You are, of course, free to use whatever you like. My TL;DR advice: Roll your own and use Algo or Streisand. For messaging & voice, use Signal. For increased anonymity, use Tor for desktop (though recognize that doing so may actually put you at greater risk), and Onion Browser for mobile.
This mini-rant came on the heels of an interesting twitter discussion: https://twitter.com/kennwhite/status/591074055018582016