293 private links
A schema of skills about influence, technology, system, people and process
Putting ️ disable the previous emoji and render it as character
︎ renders it as an emoji
But as Forbes reports, they have done it officially for tracking the chinese opioid sales.
La Bibliothèque Nationale de France (BNF) propose PressReader, un kiosque numérique pour 15€ / an.
- Télécharger l'app, créer un compte sur https://inscriptionbilletterie.bnf.fr/
- Prendre la pass BNF Lecture / Culture illimitée sur https://inscriptionbilletterie.bnf.fr/
- Attendre quelques jours et recevoir le courriel
- Se connecter sur la plateforme: https://bdl.bnf.fr/bases-de-donnees-par-titre et chercher PressReader
- Se connecter
(6.) Lors de l'accès à un titre, vous verrez ce message en jaune, mais pas de panique, pour réinitialiser le compteur, il suffit de se déconnecter puis de se reconnecter depuis https://bdl.bnf.fr/bases-de-donne
Un accès rapide: https://easybnf.fr/
Minimal web framework based on XML syntax
Focus on privacy, protection against malicious code; encryption (of everything); extending the web; make it fast; easy to publish; customization per user; first-class experience for non-English-speakers; improve accessibility
Since the beginning of the year, 100 millions of request are made everyday. A record is registered the 10th of january with 110 millions of requests.
Stats about DDG are available here: https://duckduckgo.com/traffic
The "utf8" encoding only supports three bytes per character. The real UTF-8 encoding - which everybody uses, including you - needs up to four bytes per character.
So use utf8mb4
Syntax, timing function, looped animation, multi-step animation, alternating animations, shorthand values, fill modes (forwards and backwards), dynamic animations with CSS variables
DDoS attack, distributed denial of service attack. ➡️ attaque collective par saturation de service (ACSS).
denial of service attack, DoS attack. ➡️ attaque par interruption de service (AIS).
distributed denial of service attack, DDoS attack. ➡️ attaque collective par saturation de service.
DoS attack, denial of service attack. ➡️ attaque par interruption de service.
phreaking, telephone hack, telephone hijack. ➡️ escroquerie téléphonique.
SIM swapping. ➡️ usurpation de carte SIM.
swatting ➡️ alerte malveillante.
telephony denial of service (TDoS). ➡️
attaque par saturation téléphonique (AST).
I have to test this tool to organize my ideas in the right directory with contents instead of only one directory of notes !
Cette application web permet de calculer ses revenus dépendant du TJM ou du salaire brut annuel. Il es possible de paramétrer taux de prélèvement à la source et d'inclure le .
Why? Because none of these chapters answer the most important question a reader has, the entire time, WHY!?
This is a common problems in all classic courses 🤔
A good alternative to makefiles, that I can not master yet.
Tasks is on the contrary explicit !