Interactive HTML Trees with No JavaScript https://shkspr.mobi/blog/2020/08/interactive-html-trees-with-no-javascript/
Top 7 Plugins of 2020: All Freeware – D-Lithic
Top 7 Plugins of 2020: All Freeware – D-Lithic https://dlithic.wordpress.com/2020/07/14/top-7-best-plugins-of-2020/
Full article: Beyond lists: digital gazetteers and digital history
Full article: Beyond lists: digital gazetteers and digital history https://www.tandfonline.com/doi/full/10.1080/00182370.2020.1725992
Customizing my Linux terminal with tmux and Git :: opensource.com
I use GNOME Terminal, mostly because it is my distribution’s default. But what happens inside my terminal is far from “default.” Before I get into how I customize it, here is what it looks like:
Source: Customizing my Linux terminal with tmux and Git :: opensource.com
Free Guitar Amp VST Plugins – Bedroom Producers Blog
Free Guitar Amp VST Plugins – Bedroom Producers Blog https://bedroomproducersblog.com/2012/02/21/bpb-freeware-studio-best-free-guitar-amp-simulator-vstau-plugins/
My Twitter Digest for 06/22/2020
- @PeacockEsq @Clevy_Law @caliorg We have a couple of options. There is a self-publishing platform powered by Pressbo… https://t.co/1aFKPohnE9 in reply to PeacockEsq 09:53:35, 2020-06-22
- RT @GoogleForEdu: To support the millions of educators, we’re announcing #TeachFromHome — resources to help remote teaching. 23:11:54, 2020-06-22
Run Bastions on Demand to Access Your AWS VPCs
Any time you have a VPC, you’ll likely need some way to gain access to the resources within the VPC from your local box. Typically, the way to do that is to run a bastion (or jumpbox) which you and your team can SSH into. The downside is that you are exposing an entry point into your network that is accessible by multiple people and running 24×7. And depending on how you manage permissions, you may not be able to restrict access to the box via IAM. Obviously, this is not ideal.
Luckily, we have Fargate.
With Fargate, we no longer need to maintain permanent bastion instances—we can create bastions when needed and tear them down when no longer in use. We can lock down bastion instances to an individual user both in terms of SSH keys and IP address. And we can restrict access via IAM to both the API used to manage bastions and to which SSH keys are used to log into an instance.
All in all, we save on infrastructure spend while reducing our attack surface.
Bastions on Demand :: The Consulting CTO
This looks like an intriguing solution to a problem that has bothered me for years. Running sshd provides an attack surface for bad actors just because it’s there. Ideally you should never expose the ssh port to the public network, even if it is well secured. Bastion hosts are a well known solution to this but one that is often not implemented for one reason or another. Turning it inot a service seems like a good idea.
SuperCollider – A platform for audio synthesis and algorithmic composition
SuperCollider – A platform for audio synthesis and algorithmic composition https://supercollider.github.io/
LaTeX.css — help us remember what web should be
LaTeX.css — Make your website look like a LaTeX document https://latex.now.sh/#top
This helps us to remember that web was not built to sell you crap, spread disinformation, or goad us into fighting each other, it was built to share information and knowledge, to build community, and foster collaboration. The world would be a better place if the web’s original purpose had prevailed.
The Verge: Xbox and Windows NT 3.5 source code leaks online
The Verge: Xbox and Windows NT 3.5 source code leaks online. https://www.theverge.com/2020/5/21/21265995/xbox-source-code-leak-original-console-windows-3-5