Two keystrokes? I’ll take ’em!
Better than Time Machine and Rsnapshot.
osx, best practices, backups
You see them everywhere, but here’s why they’re bad and what to use instead.
ux, type, print, accessibility
With some obvious security measures you can make it that much harder to guess your users’ passwords.
security, passwords, hacking
Target IE 10 just through CSS with the help of an old friend.
Because it crashes too often.
Questions to ask a VPN service provider.
privacy, security, vpn
An ingenious way to make a TODO item.
This handy function lets you read unique values from a JSON file.
bash, json, node
Your IP address is embedded in your sent email which can expose your physical location. Here’s how to remove it.
security, postifx, privacy, email