Useful bookmarks for hackers
Last edit: 2022-02-10
Editor's note: The following are in no particular order, and comprise only what I consider to be useful bookmarks. It is by no means objective, exhaustive, of definitive in any way. You may find a few gems. Or not.
- SoftwareDevelopment at WikiWikiWeb
Editor's Note: You will definitely get lost in here for a couple weeks. - chmod calculator
- continuousdelivery.com
- 97 Things Every Programmer Should Know (english edition)
- example.org
- Internet Users' Glossary (RFC 1983)
- The Jargon File
- How to become a hacker
- Soft Skills Engineering Podcast
- Hacker News
hacker
A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular. The term is often misused in a pejorative context, where "cracker" would be the correct term. See also: cracker.
- The Tao of Programming
- Rootless Root: The Unix Koans of Master Foo
- The Unix Power Classic
- The Amazing Duff's Device by Tom Duff!
- Proper Use of SSH Client in macOS X
- Rectangle App: A window manager for macOS
- Network Protocols for anyone who knows a programming language
- Crontab generator
- Patterns for Managing Source Code Branches
- Minimum Viable CD
__...--~~~~~-._ _.-~~~~~--...__ // `V' \\ // | \\ //__...--~~~~~~-._ | _.-~~~~~~--...__\\ //__.....----~~~~._\ | /_.~~~~----.....__\\ ====================\\|//==================== dwb `---`
- Execution in the Kingdom of Nouns
- tldp - The Linux Documentation Project
- Learn REST: A RESTful Tutorial
- git
- Homebrew
- History of the word "foo" in programming
- The Z Shell Manager
- The classic test command (Bash Hacker's Wiki)
- Why can't programmers...program? (Coding Horror)
- Learn how to read and write binary numbers in 5 minutes.
cracker
A cracker is an individual who attempts to access computer systems without authorization. These individuals are often malicious, as opposed to hackers, and have many means at their disposal for breaking into a system. See also: hacker, Computer Emergency Response Team, Trojan Horse, virus, worm.
- Terminology, Power, and Oppressive Language (IETF)
- Changing the default branch for new Git repositories
- Keep interfaces small
- github.com/donnemartin/system-design-primer
- Why we at $FAMOUS_COMPANY Switched to $HYPED_TECHNOLOGY
- SOFTWARE HORROR STORIES
- Timeline of sexist incidents in geek communities
- Teach Yourself Programming in Ten Years
- The Myth of the Sufficiently Smart Engineer
- IT runs on Java 8
.................................................. : ...... : : .:||||||||:. : : / \ : : ( o o ) : :-------@@@@----------: :----------@@@@---------: : `--' : : : :................................................:
- BBS: The Documentary
- Cognitive Biases in Software Engineering
- RFC 2119: Key words for use in RFCs to Indicate Requirement Levels (MUST, SHOULD, MAY, etc.)
- SSH config file for OpenSSH client
- Measure Software Delivery Performance with Four Key Metrics
- Sandi Metz on The Wrong Abstraction
- Unicode - How to get the characters right?
- Wat: A lightning talk by Gary Bernhardt from CodeMash 2012
- Hash buckets and % vs. & ops
- Falsehoods developers believe about prices
- Brilliant jerks in engineering
Let us change our traditional attitude to the construction of programs. Instead of imagining that our main task is to instruct a computer what to do, let us concentrate rather on explaining to human beings what we want a computer to do.
—Donald Knuth
- Intro to systems thinking
- Documenting architecture decisions
- Programming sucks
- Why I Wrote PGP by Philip Zimmermann
- Programmer interrupted: research on the effects of interruptions on programmers
- Don't Call Yourself A Programmer, And Other Career Advice (Kalzumeus)
- The early history of Smalltalk by Alan Kay
- RFC 2549: IP over Avian Carriers with Quality of Service
- Futureboy's PGP tutorial
- Code Review Guidelines for Humans
- PERT estimation tutorial
- Rubber duck debugging: Debug software with a rubber ducky
___.___ ~ _____________ \ \\ \ ,, ??? | '\\\\\\ \ \\ \ /< ? | ' ____|_ --\//,- \_. /_____ | '||:::::: o- / \_/ '\ | '||_____| | \ ' o \'________|_____| | )- # < ___/____|___\___ `_/'------------| _ ' <<<:| /________\| |_________'___o_o| b'ger
- How environment variables work
Editor's Note: Ignore the "Rubyist" reference on this one, it applies to everybody! - The Principles of OOD
- The Bash Hackers Wiki
- Salary Negotiation: Make More Money, Be More Valued from Kalzumeus
- What's the difference between git fetch and git pull?
- Lazy Programmers Guide
- Please. Don't Patch Like That.
- Netcat – a couple of useful examples
- Suffering-oriented programming
- random.org
- What makes a great software engineer?
—\x53.\x41.\x53