871 private links
Not only the answer help solved a mystery I had for weeks, it also demonstrated how to solve the same kind of problem using auditd. Great to learn about it!
Interactive explanation on X Window systems, including the interesting history limitation and workarounds, and the mess brought up by the need of direct gpu-access.
Interesting article comparing x86 with other IA by Raymond C.
Also see: https://devblogs.microsoft.com/oldnewthing/20220418-00/?p=106489 (The x86 architecture is the weirdo, part 2)
An interesting article on why there is half megabytes of empty bytes in every music file.
Alongside the desire to brainwash people, the regime also wants to remind people of their power. When citizens are bombarded with propaganda everywhere they look, they are reminded of the strength of the regime. The vast amount of resources authoritarian regimes spend to display their message in every corner of the public square is a costly demonstration of their power.
Propaganda is intended to instill fear in people, not brainwash them. The message is: You might not hold pro-regime values or attitudes. But we will make sure you are too frightened to do anything about it.
Insightful! Considering China on these days, if the torrent of stupid propaganda abated, it would be resonable to suspect that Xi's power has been suppressed probably by his political enemies.
I find this documentation as interesting as DALL-E 2 itself. It underlines a number of potential "misuses" and mitigation.
A list of search engines as alternatives to Google. Unlike engines like duckduckgo that uses bing as backend and yield inferior results, these ones each has different ways of innovation. I've been using Kagi for more than half a year now, and pretty happy with it.
Fun and useful HTML attributes that I didn't know before.
The part that interest me the most is a comment which I copied here:
ORG-MODE TOOLS OUTSIDE EMACS
Hacking with DDC, HDMI, i2c, SMBus, XRandR. It's such an interesting experiment and I learned a lot from the post!
No need to trust self-signed certificate to intercept tls traffic, if we have the secret keys.
Good info on how to use GDB with Rust, as well as other profiling/tracing tools. It also showcased how to use various error handling tools to catch and display nested exceptions.
Free high quality public domain books formatted and curated by one woman. Marvelous.
Other high quality public domain ebooks:
Tips on writing bash scripts that can be run repeatedly.
Mostly book/resource recommendation. The author added detailed reasons and excerpts for each book.
This article is a guide on how to backup application data that can only be viewed on Android devices. It also allow to restore application data in Android.
Zero-dependency blink led as a demo on how to write embedded rust.
I just learned that people actually made a software for the idea! Fascinating!
An interesting idea to curate a list of filters for non-ad/tracking-blocking purposes.