Index
Computing
Hardware
HDMI Cable
How to Coil Cables: The Over Under Technique
リチウムイオンバッテリーについて
Radio Frequency Explained
無停電電源装置 (UPS) の選び方
Video Calibration
Network
Application Layer
Encapsulation
Ethernet Cable Category Pitfalls
HyperText Transfer Protocol (HTTP)
HTTP Security
Internet/Network Layer
Link/Data Link Layer
MAC Addresses
Message Authentication Code (MAC)
Method Access Control
Networking Foundations
Networking Models
Physical Network
Protocols
Stateful Web Applications
TLS Authentication
TLS Encryption
TLS Handshake
Transmission Control Protocol (TCP)
Transport Layer
User Datagram Protocol (UDP)
VDSL 方式
Security
Android
Android Architecture
Android Virtual Machines
Cyber Kill Chain Methodology
Cybersecurity Home Lab Environment
Data on Payment Card
Difference Between Penetration Tester and Red Teamer
Economy of Mechanism
Resolve GPG Unsafe Permissions
IDOR: Insecure Direct Object References
Information Gathering with sqlmap
Install Kali NetHunter on Pixel 3a
IoC: Indicators of Compromise
ISO/IEC 27001
ISO/IEC 27001 in Practice
IT Governance
The OSINT Cycle
Introduction to OSINT
PCI Standards
PenTest Home Lab Environement with QEMU/KVM
PenTest Methodology: Quick Example
パスワードが平文で保存されているかを確認する雑な方法
Relationship of Data, Information, and Intelligence
Scanning Networks
Secure SSH Key Generation
ssdlc
Access Control Requirements
Accountability
Authorization
Availability
Complete Mediation
Confidentiality
Core Security Principles
Data Destruction
Data Lifecycle
Data Protection
Data Sharing
Decommissioning Software Securely
Defense in Depth
Describe Psychological Acceptability
Discovering Secure Software Requirements
Documenting Software Requirements
Economy of Mechanism
Gathering Security Requirements
Governance
Identify Compliance Requirements
Implementing Data Protection
Incorporate Security into the SDLC
Integrating Security into Software
Integrity
Least Privilege
Legal and Regulatory Issues
Manage Security Requirements with Third Party
Managing Software Lifecycle Risk
Managing Software Operational Security
Resilience
Security Metrics
Software Development Methodologies
Software Security Standards
Version Control
The Confused Deputy Problem
Threat Modeling
STRIDE-per-Something Methodology
Threat Mitigation
Threat Model Approach
Threat Modeling for Personal Usage
Threat Modeling Methodology
Threat Modeling Vocabulary
Trust Boundary and Entry Point
TTPs: Tactics, Techniques & Procedures
What is Malware?
What is OPSEC?
What is Reconnaissance/Footprinting
What is Security?
Software
Approach to OOP
Attributes vs State
CAP theorem
CD/DVD から ISO を生成する方法
Cloning Pages with
wget
Closure
Collaborator Objects
Common Collection Methods
Containers: a Primer
Control Character
Dates to Test in your Program
Datetime, Time Zone Formatting, ISO and RFC
Difference Between Boolean Values and Truthy/Falsey
Divisions with Integer
Docker
Download Music with youtube-dl
Duck Typing
+ を使ったメールアドレス
Evaluate a Block
false vs nil and the Idea of “Truthiness”
Transcode DTS with FFmpeg
Firefox Developer Tools
Fix Bad Merge with Git
FLAC Compression Levels with FFmpeg
フォークしたリポジトリにアップストリームの更新を反映させる
Heredoc
What is Heroku
HTML/CSS
CSS Attribute Selectors
CSS Box Model
CSS Box Sizing
CSS Containing Floats
CSS Dimensions
CSS Display
CSS Margins and Padding
CSS Position
Use Description List to Mark Up Forms in HTML
The
<datalist>
Tag
The
<label>
and
<input>
Tag
The
reset
Type on
input
Tags
The
<video>
Tag
Inheritance vs. Association
Instance Methods vs. Class Methods
Java
Java Prefix and Postfix Operators
Java Primitive Data Types
Loops in Java
Methods in Java
String Equality in Java
String.length() vs String.getBytes().length in Java
Kakoune の使い方
Keystroke Idioms in Kakoune
Kubernetes
Leaning Toothpick Syndrome
Linux
Audit File Access on Linux
Clear log the proper way
Convert Date to Current Time Zone
Convert OVA Image to QCOW2 Image (QEMU, virt-manager)
Debian/Ubuntu 系のお掃除
End Of File Character
git log a dog 🐶
Import Multiple OVPN Files to NetworkManager
Update inotify max user watches
Linux alongside Windows
Add Linux App to Launcher
Unix で強制終了・強制再起動
Linux Full Disk Encryption
Linux Process Substitution
QEMU/KVM Fundamentals
QEMU Networking
Command for Safe Shell Scripts
Wine Network Permissions
Local Variable Scope
Logical Operators
Method Definition and Method Invocation
Microservices
Mutable and Immutable Objects
Mutation in Arrays
NUT on OpenWrt
OAuth 2.0 and OpenID Connect
Pairwise (All-Pair) Testing
Parameter vs Argument
Pass by Reference vs Pass by Value
PostgreSQL
Understanding Recursion (Factorial)
Understanding Recursion (Fibonacci Sequence)
Recursive Methods
Regular Expressions
Basic Regex
Regex Anchors
Regex Miscellaneous
Regex Options
Regex Quantifiers
Regex Shortcuts
Relational DataBase Management System
Reset Synology DSM Firewall
rsync でバックアップを作成する
Ruby
Blocks in Ruby
Calling zip with a block
Classes and Objects
Debugging with Pry
Difference between loop and each in Ruby
Fake Operators and Equality
Generating a List of Substrings
Getter/Setter Methods in Ruby
Heredoc with Ruby
Implicit Return Value of Method Invocations and Blocks
Infinity in Ruby
The inject and reduce Method
Learning Tracks
Maths Shortcut Tricks for Code
Practice Problems: Arrays Manipulation
Practice Problems: Arrays Manipulation
Practice Problems: Indexes Manipulation
Practice Problems: Local Variable Scope
Practice Problems: Arrays Manipulation
Practice Problems: Substrings Manipulation
Practice Problems: Substrings Manipulation
Practice Problems: Truthiness
Practice Problems: Variable Shadowing
Recall Technique
Study Guide for Interview
Study Guide for Test
Use Precise Vocabulary
Method Lookup Path
Method with Block at Invocation
Modules
Deciding Whether Part of a Code is a Block or Not
Polymorphism
puts vs return
rbenv Ruby versions and gems
Return the Last n Digits in Ruby
Rubocop
Ruby’s any? Method
Ruby’s case Statement One Liner
Ruby’s case Statement Witout Comparison Value
Ruby’s Comparable
Difference Between sort and sort_by in Ruby
Ruby Exceptions
Ruby’s gets and chomp
Ruby’s format Method
Ruby’s ::new Class
Ruby’s Parallel Assignment
Ruby’s Pass by Reference of the Value
Ruby’s Proc and its Scope
Ruby’s *Splat Operator
Ruby’s Static Method
Ruby’s casecmp? Method
Ruby’s center Method
Ruby’s delete and count Method
Ruby’s gsub Method
Substrings in Ruby
Ruby’s Symbol
Ruby Syntactical Sugar Pitfalls
Ruby’s Ternary Operator
Search and Replace in Ruby
Split String into Characters
Testing with Ruby
Type of Variables
What is self in Ruby
while, until and for Loop
SEAT Approach
Shallow Copy
Software Architecture
Sorting of Arrays
Structured Query Language (SQL)
SVG optimization
On Tabbing/Bracing Style
Tail Recursion
tmux Idioms in Kakoune
Torrent Client Settings
Variable Scope in Object Oriented Programming
Variable Shadowing
Variables as Pointers
Vim Keystrokes
What is fast-forward in git
What is Object Oriented Programming
Working with Collections
Written Assessments
Yielding
My First Zettel
Life
Charge More
Convert Decimal Degrees into Degrees, Minutes, Seconds
日本 🇯🇵
著作権の記載について
「使用」と「利用」の違い
起承転結
公正世界誤謬
Lifestyle Business
Music
The Carver Challenge
Audio System on the Cheap
Richard Clark $10,000 Amplifier Challenge FAQ
Objectives and Key Results
The O’Neill Cylinder
Pricing Strategies
Privacy
Google AMP is a Hostile Attempts to Control the Web
ツイートやいいねを自動的に削除する
Exif データを Exiftool で削除する
Fawkes: Digital Image Cloaking
Internet Changed the Concept of Privacy
Configuring Matomo for Better Privacy
The Prodigal TechBro
Redirect AMP Links to Actual Websites with Privoxy
Taking Back Control of Digital Life
No, We Cannot Learn to Live with this Privacy Paradigm
Quotes
Shipped My First SaaS Side Project While Working Full Time
Wikipedia の重要さ
Taking notes
What language should I write in?
The Zettelkasten Principles