today's howtos
-
Peteris Krumins ☛ 2023-12-22 [Older] How to Run Firefox in Firefox (browser in browser)
-
Peteris Krumins ☛ 2023-12-20 [Older] How to Run Chrome in Chrome (browser in browser)
-
University of Toronto ☛ Do we actually need negative access control rules (in general)?
Every so often, someone has the great idea to simplify how to specify access controls; they will make their overall policy to deny access by default, and then have all of their access control rules be positive ones. My reaction to date to these systems is that they've just made my life harder, and I was all set to write an entry about it except that as I started writing out the details I realized that I wasn't sure I had a convincing case when negative access rules made things much less convoluted.
-
12 Days of Web ☛ Container Style Queries
One of the most requested features in CSS was container queries, the ability to query the size of a parent container. Before container queries, you could only query the size of the viewport. That worked well and still does, allowing you to create responsive websites, but it's really just a compromise because, in most cases, we're interested in the size of our parent container, not the size of the viewport.
That’s why container queries are such a critical addition to CSS.
-
Manuel Matuzović ☛ Never underestimate HTML
What follows now is an article about thoughts that came to my mind in the last couple of years when working together with different people from different teams with different backgrounds in HTML and frontend technologies in general. This is an article about the many “whys” in my head and possible answers…
-
University of Toronto ☛ A DKIM signature on email by itself means very little
In yesterday's entry on what I think the SMTP Smuggling attack enables, I casually said that you were safe if you ignored SPF results and only paid attention to DKIM. As sometimes happens, this was my thoughts eliding some important qualifications that I just take as given when talking about DKIM, but that I should spell out. The most important qualification is that a (valid) DKIM signature by itself means almost nothing, which is a bit unlike how SPF works.
-
Hunor Márton Borbély ☛ Day 25: How to Break Down an SVG Image into Multiple Components
If you got this far then give yourself a well-deserved pat on the back as you just learned the basics of SVG with many cool use cases.
If you continue on your journey and you start to write more and more complex SVGs then at one point you might find that their code starts to get a bit out of hand. Then you can break them down into components. Here we are using React again, but the same concept applies to any other frontend library that you might use. Mind though that there’s only one SVG element at the root of the component as there’s still only one image. The child components have their content in group elements.
-
LinuxTechi ☛ How to Install Zorin OS 17 Step-by-Step with Screenshots
-
Linux Made Simple ☛ 2023-12-22 [Older] How to enable audio input for Linux Applications on a Chromebook
-
Linux Made Simple ☛ 2023-12-21 [Older] How to install Visual Pinball X on a Chromebook
-
Linux Made Simple ☛ 2023-12-20 [Older] How to install Gacha Diamond on a Chromebook
-
Linux Made Simple ☛ 2023-12-19 [Older] How to install 0 A.D. on Feren OS
-
Linux Made Simple ☛ 2023-12-19 [Older] How to Powerwash your Chromebook
-
Linux Made Simple ☛ 2023-12-17 [Older] How to install Scratchin' Melodii - Christmas SAGE on a Chromebook
-
Linux Made Simple ☛ 2023-12-17 [Older] How to install WPS Office on Peppermint OS
-
Linux Made Simple ☛ 2023-12-15 [Older] How to install Dragon Ball JUS Edition Ultimate Mugen on a Chromebook
-
HowTo Geek ☛ 5 Ways You Can Install Ubuntu on External Storage
In case you don't want to mess with your Windows installation.