Specifically, it’s for Maemo, which means it’ll run on the N900. Sweet!
This song’s a favourite of mine, but the lyrics I use differ a touch from the standard translation from German (though not as much as some). The tweaks are all out getting the song to fit my cadence a bit better.
This site is an adjunct to the book Hacker’s Delight (Addison-Wesley, 2003). It may become a forum for discussions about the kind of algorithms that are in that book. There is no mechanism set up yet for discussion threads, but if you send me email (see the bottom of this page) I’ll post it if it seems appropriate. Please also send email if you find errors in the book.
I linked to the day archive page on Keith’s site because of what appears to be a redirection bug.
ijson is a Python wrapper to YAJL which is a streaming SAX-like JSON parser. Ijson provides a standard Python iterator interface for it.
Yes, there are definite reasons why the vi/vim editing model is just superior to any other out there. And you don’t need to be a Unix whiz to use it, either: vim is available for free for almost any platform out there, and there are plug-ins to get the functionality inside all major IDEs. Let’s try to break a few misconceptions, and see some real examples of why it’s the killerest.
Tools for parallelising the execution of shell scripts.
A Firefox plugin for sniffing for unsecured cookies on a WiFi network. As to why this would be important…
It’s extremely common for websites to protect your password by encrypting the initial login, but surprisingly uncommon for websites to encrypt everything else. This leaves the cookie (and the user) vulnerable. HTTP session hijacking (sometimes called “sidejacking”) is when an attacker gets a hold of a user’s cookie, allowing them to do anything the user can do on a particular website. On an open wireless network, cookies are basically shouted through the air, making these attacks extremely easy.