Online privacy is more than just using a VPN. Mullvad Browser offers Mullvad Leta, an alternative search engine only accessible with a paid Mullvad VPN account. Mullvad Leta uses the Google Search API to cache results, share them amongst users and improve privacy. Mullvad Leta’s services are user-supported, without ads or data selling. A browser […]
Read more »
A new study published in the Journal of Happiness Studies, ‘Alone in a Crowd: Is Social Contact Associated with Less Psychological Pain of Loneliness in Everyday Life?’, questions the notion that social contact can reduce feelings of loneliness. The study, which analysed 3,035 participants’ daily lives using ecological momentary assessments, found that social contact amplifies […]
Pg_easy_replicate is a CLI tool that makes it easy to establish logical replication between two PostgreSQL databases and supports switchover. Once replication is complete, the tool puts the primary database into read-only mode and flushes all data to the new target database via logical replication, resulting in zero data loss and minimal application downtime. Users […]
In a recent thread on the TUHS mailing list, members discussed the discovery of a compiler Trojan horse by researchers in the 1980s. The Trojan horse, which was originally developed by Ken Thompson, was designed to insert backdoor vulnerabilities into software without being detected. The researchers at PWB discovered the Trojan horse accidentally, even though […]
Federated applications face several challenges to mass adoption, including a steep learning curve and a lack of user intuitiveness. Users must understand that federation involves not just one server, but many different servers that can read content from each other. This poses a problem for search engine optimization, as multiple instances hosting the exact same […]
The author continues their multi-part series on dynamic programming in Haskell and explores the idea of a magic memoization function that can automatically generate a memo table for any given recursive function, making it faster. While it seems impossible, the author breaks down the concept and provides a solution that sticks the call to memo […]
Many Unix-like/POSIX systems have issues with handling filenames and pathnames in shell scripts, which can lead to bugs and security vulnerabilities. Some shell programming books and even the POSIX standard sometimes teach the incorrect way to handle filenames. So, it’s crucial to understand how to handle filenames correctly to avoid potential harm. This essay provides […]
In 1979, Tyrgve Reenskaug published a paper about a design pattern he invented for developing applications with a graphical user interface, called MODELS-VIEWS-CONTROLLERS. The original document described each component in its own section and had the following elements: Models, Views, Controllers, and Editors. However, the modern interpretation of MVC has evolved significantly, and each variation […]
In order to be a successful programmer, one needs to understand how to manipulate bits, including individual bits within a register. Programming with integers can be done using 8-bit, 16-bit, 32-bit and 64-bit integers. Go has several important binary operators that are used to manipulate bits, including bitwise AND, OR, XOR and AND NOT, as […]
A 96-page report, Security Analysis of Georgia’s ImageCast X Ballot Marking Devices, authored by J. Alex Halderman and Professor Drew Springall, has been released by the U.S. District Court for the Northern District of Georgia, demonstrating numerous security problems affecting Dominion voting equipment used in Georgia and other states. The report, part of a voting-rights […]