904 private links
To test Linux Distros.
En typographie, il existe tout un tas de rĂšgles sur la gestion des espaces entre les mots et les caractĂšres. Malheureusement, le Web est extrĂȘmement fruste de ce point de vue lĂ , Ă ce quâil paraĂźt. Mais quâen est-il rĂ©ellement ? PrĂ©cĂ©demment, Je vous ai parlĂ© des ligatures qui sont une des rĂ©ponses (parmi bien dâautres) Ă la question des espaces entre les lettres. Cette fois-ci, nous allons nous pencher sur la question des espaces entre les mots. Est-ce quâil se pourrait quâon puisse utiliser lâespace fine insĂ©cable⊠en vrai ?
Faut-il avoir son propre résolveur [DNS](https://fr.wikipedia.org/wiki/Domain%20Name%20System "Consultez l'article "Domain Name System" de l'encyclopédie libre Wikipedia"), sur sa machine (ou, au moins, sur son réseau local à soi) ? Question compliquée à laquelle je réponds désormais oui, en raison de l'intensification de la censure utilisant le DNS.
Should I Click is a free service to check if a website is safe to access. The great majority of attacks, including targeted attacks, start with a link in an email or chat. When you do not have enough time, or you do not know how to check the URL, should you click on it or not? Our Should I Click service could be helpful for you.
If you received a suspicious link or a website looks weird, Should I Click is the right and easy-to-use tool to analyse if it is safe to click. Should I Click uses a wide range of technologies, including machine learning, statistical analysis and security tools. The aim of this project is to help people at risk around the world (such as Journalists, NGOs, political activists) against targeted cyber attacks. However everyone can use this service.The shouldiclick.org project is a tool created in Civilsphere laboratory (https://www.civilsphereproject.org/) at the Czech Technical University in Prague to help to protect the civil society for free. This project is part of the diploma thesis of FrantiĆĄek StĆasĂĄk that will be finished in May 2020.
Free website reputation checker tool lets you scan a website with multiple website reputation/blocklist services to check if the website is safe and legit or malicious. Check the online reputation of a website to better detect potentially malicious and scam websites.
Je prĂ©sente Ă votre attention la traduction de l'article "Comment analyser l'URL en JavaScript: nom d'hĂŽte, chemin, requĂȘte, hachage" de Dmitri Pavlutin.
Uniform Resource Locator ou URL pour faire court est un lien vers une ressource Web (page Web, image, fichier). L'URL définit l'emplacement de la ressource et la maniÚre dont elle est reçue - le protocole (http, ftp, mailto).
An object in JavaScript is something similar to a real-life object. For example, an object can be your computer. It has various properties like color, screen size, and many methods (functionalities) like internet browsing. Computers can vary though, for example, they can have a different operating system, like macOS or Linux. Just like other data types, objects can contain various values. The values are written in a key-value pair saved inside curly braces. These key-value pairs are called properties of objects. Functions which are also properties are called methods.
From Medium.
Ce livre a Ă©tĂ© conçu pour vous permettre dâapprendre Ă utiliser efficacement toutes les fonctionnalitĂ©s de Base, le gestionnaire de bases de donnĂ©es de LibreOffice 7.1. Il vous explique en dĂ©tail l...
En quoi ça me concerne ?
« Je n'ai rien Ă cacher. Pourquoi devrais-je me soucier de ma vie privĂ©e ? »Tout comme le droit au mariage mixte, le droit de vote des femmes, la libertĂ© d'expression et bien d'autres, notre droit Ă la vie privĂ©e n'a pas toujours Ă©tĂ© respectĂ©. Dans plusieurs dictatures, ce n'est toujours pas le cas. Nombreux sont nos ancĂȘtres qui se sont battus pour notre droit Ă la vie privĂ©e. La vie privĂ©e est un droit humain inhĂ©rent Ă chacun d'entre nous auquel nous avons droit sans discrimination.
Il ne faut pas confondre la vie privĂ©e et le secret. MĂȘme si on sait ce qui se passe dans la salle de bain, vous fermez quand mĂȘme la porte. C'est parce que vous voulez une vie privĂ©e, et non pas du secret. Tout le monde a quelque chose Ă protĂ©ger. La vie privĂ©e est quelque chose qui nous rend humains.
Psono is an open source and self hosted password manager to help keep your data safe. It stores your credentials encrypted and only you can access your data. Access can be shared encrypted with your team. As an open source password manager, Psono comes with a variety of features to manage your data and access your passwords more easily than ever before.
In this article, we will look at some of the hottest CSS tools available to developers today, including frameworks, libraries, and utilities, to help you stay ahead of the curve and take your CSS skills to the next level.
TL;DR:
Neumorphism.io
Animista
Wweb.dev
Spin Kit
Flexplorer
CSS Grid Generator
CSS Layout Generator
Shadows Brumm
Glassmorphism
Cubic-Bezier
Haikei
Extrated with:
const linksElements = Array.from(document.querySelectorAll("#article-body > h2 + p + p > a")).map(el => `[${el.textContent}](http://${el.href})`).join('\n');
alert(linksElements);
CSS Hamburger Menus are very important for responsive web design. Take inspiration from our Hamburger Menu codepens examples
Origin: https://medium.com//the-native-way-to-configure-path-aliases-in-frontend-projects-5db70f19a6e0
Projects often evolve into complex, nested directory structures. As a result, import paths may become longer and more confusing, which can negatively affect the codeâs appearance and make it more difficult to understand where imported code originates from.
Using path aliases can solve the problem by allowing the definition of imports that are relative to pre-defined directories. This approach not only resolves issues with understanding import paths, but it also simplifies the process of code movement during refactoring.
We believe saving passwords in an app, or uploading them all to the cloud, is a recipe for personal disaster.
Why?
Your privacy is your life.
To them, itâs a risk assessment.The only password that canât be lost, stolen, seized, ransomed or left on the bus, is a password that doesnât exist.
Spectre is a password app that contains no passwords.
Bash How-to guides and examples
An A-Z Index of the Apple macOS command line (macOS bash)
The AWK command dates back to the early Unix days. It is part of the POSIX standard and should be available on any Unix-like system. And beyond.
While sometimes discredited because of its age or lack of features compared to a multipurpose language like Perl, AWK remains a tool I like to use in my everyday work. Sometimes for writing relatively complex programs, but also because of the powerful one-liners you can write to solve issues with your data files.
This document is a collection of Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users. This is a practical guide with concise explanations, however the reader is supposed to know what s/he is doing.
Dans cet article je vais rapidement expliquer pourquoi le choix de TrĂŠfik plutĂŽt que Nginx que jâutilisais avant ça. Ensuite jâexpliquerai les configurations utilisĂ©es pour mettre Ă disposition nos conteneurs. Nous aborderons rapidement quelques points pour aller plus loin et finirons par une conclusion.
Ici nous allons voir comment avoir plusieurs profils Git (email, clé GPG, etc) en fonction du ou des répertoires le tout automatiquement.
TL;DRâŻ:
Modifier le fichier .gitconfig
[include]
path = ~/.config/git/git-personal.conf
[includeIf "gitdir:~/dev/work/"]
path = ~/.config/git/git-work.conf