Requirements: I am writing several reusable libraries which need to refer each other in myriad ways, each may be worked upon by different developer. I don’t want to create a jumbo project with sub-modules where access control is a pita. I don’t want the repository to be publicly accessible. There should be fine-grained access control […]
Category: Featured
Featured Article
20 years ago to ensure that Amazon would retain high standards as it grew, Jeff Bezos outlined a simple, three-question test for hiring new employees in his 1998 letter to shareholders, a year after the online bookseller went public. “It would be impossible to produce results in an environment as dynamic as the Internet without […]
Any version of Raspberry Pi can be very easily configured with WiFi access. Coupled with ssh or vnc, it allows you to manage your Pi remotely. Here is the simplest way I could think of, illustrated by a screenshot and detailed below. Once your Raspberry Pi boots up, you will get to this shiny screen. […]
Skype accounts are being hacked since at least August last year. Breached Skype accounts are used to send thousands of spam messages before they’re locked by Microsoft. The owners then have to regain access and that is when most find out about it. Skype has fallen victim to similar attacks before, and hackers were able […]
Is your MongoDB properly running? A simple way to check it would be with: service mongod status On my CentOS 5.x it gave: mongod dead but subsys locked There are two possible causes I could find. First is related to disk space. If you do not have enough space for dbpath (database directory) then you […]