How does the “incomplete address” scam work? What happens if you divulge your payment information? How can you avoid it?
Software on the web discloses a wealth of information with little prompt. Help protect your privacy by using these anti-fingerprinting options.
In this post, I urge Ruby gem maintainers to be aware of the files they distribute with their gems. If your gem includes files which you have not consciously included for a specific reason, please consider removing these files from your gem.
I’m at the store shopping for groceries, and I’m considering buying a thing. I’ve narrowed down my selection to two final candidates. These two options look equivalent in nearly every aspect, except for the part where they are packaged in differently-sized containers, and the price is different. So… what now?
After fights with the server browser and entirely too many buggy prop hunt servers, I decided to set up my own dedicated server for Garry’s Mod. Documentation for this does exist, but I had to start from scratch a few times in order to get everything just right. This is the information I wish I had when setting it up the first time.
In this very inspiring blog post, Kirsle accuses Time Warner Cable in Los Angeles, CA of traffic-shaping speed tests in order to make it appear that they are delivering internet speeds as advertised (when in fact, they aren’t). My post aims to be a spin-off experiment.
I hate it when software triple-checks you before performing a potentially risky operation. Operating system install tools are especially bad about this. Sometimes, they prevent you from installing the OS altogether.