Explore >> Select a destination


You are here

blog.peterritchie.com
| | www.softdevtube.com
10.3 parsecs away

Travel
| | Programming history is filled with bugs that turned out to be features and limitations that pushed developers to make even more interesting products. We'll journey through code that was so 'bad' it was actually good. Along the way we'll look at the important role failure plays in learning. Then we'll tame our inner perfectionists and
| | enterprisecraftsmanship.com
10.8 parsecs away

Travel
| | My new online training course about Encapsulating EF Core Usagewent live.
| | michaelneuper.com
10.1 parsecs away

Travel
| | A buffer overflow attack is a type of cyber attack in which an attacker attempts to write more data to a buffer (a temporary data storage area) in a computer's memory than the buffer is designed to hold. This can cause the buffer to overflow, or exceed its maximum capacity, which can corrupt other parts of the computer's memory and allow the attacker to gain unauthorized access to the system.
| | blog.hao.dev
43.1 parsecs away

Travel
| I have been working with different fonts for ages, but never understood the difference. Recently, I have been working on a project where we need to decide a list of fonts to support. After some very basic research, here is what I found out.