This talk introduces Python programming language basics, covering fundamental concepts and practical applications for beginners. It provides an overview of Python's syntax, core features, and common use cases in software development.
jyn-dev
30 items from jyn-dev
The article discusses the technical challenge of copying generic arrays in Java, highlighting the limitations of Java's type system and providing potential solutions for this programming problem.
The author describes rewriting Jython out of boredom one day. The article discusses the process and technical aspects of this rewrite project.
The article discusses file synchronization methods for KeePass password manager between Linux and Android devices. It covers various approaches including cloud storage services, local network sync, and specialized tools for maintaining password database consistency across platforms.
The article covers fundamental techniques for reverse engineering x86 assembly code on Linux using GDB. It explains how to decompile binaries and analyze their assembly instructions for understanding program behavior.
The article describes a Google CTF reverse engineering challenge where a path traversal vulnerability allows reading system files. Using the /proc filesystem, the author retrieves the binary and analyzes it with GDB to find the flag file location. The solution involves exploiting the vulnerability to access the flag file and obtain the CTF flag.
The author describes their process for getting multiplayer Civilization 5 to work on Linux, overcoming compatibility challenges to enable online gameplay on the platform.
This presentation provides an introduction to Linux, covering its fundamental concepts and basic usage for beginners. It explains key components of the Linux operating system and how to get started with common commands and system navigation.
Intro to C
0.0This introduction to C programming covers the language's fundamental concepts, syntax, and core features. It explains basic programming structures and how C serves as a foundation for system-level development.
This presentation introduces reverse engineering concepts, explaining how to analyze software and hardware to understand their inner workings. It covers fundamental techniques used to examine compiled code and systems without access to original source materials.
The author describes their journey to becoming the second-most prolific contributor to Docs.rs, a documentation hosting service for Rust crates. They explain their contributions to the platform's development and maintenance over time.
Rust in 2021
2.0The article discusses priorities for Rust development in 2021, emphasizing the need to improve discoverability of features and documentation. It suggests focusing on making Rust's capabilities more accessible to developers.
The article describes the author's involvement in stabilizing intra-doc links in Rust documentation. It details the technical challenges and collaborative efforts required to make this feature reliable for Rust developers.
The article discusses Higher-Rank Trait Bounds (HRTB) in Rust, examining complex but valid Rust programs involving lifetime annotations and trait bounds. It explores why HRTB can be challenging for Rust developers to understand and use effectively.
The article provides frequently asked questions and practical advice for working with Rust's borrow checker. It offers tips and techniques to help developers understand and manage ownership and borrowing rules effectively.
Niko Matsakis, co-lead for the Rust language team, published a song titled "Edition: the song." In response, the author sang a cover of "I'll Rust With You" by Steam Powered Giraffe, noting the song has no relation to the Rust language beyond the title.
The article discusses async/await syntax in programming, explaining how it simplifies asynchronous code by making it appear synchronous while maintaining non-blocking behavior. It covers practical implementation details and benefits for developers working with asynchronous operations.
The article discusses bootstrapping compilers, where a compiler is written in its own language and can compile itself. This approach creates self-hosting systems that can evolve independently of other toolchains.
Git cheats
1.0This resource provides tips and tricks for dealing with Git's error messages, offering practical guidance for developers working with the version control system.
The article discusses the challenges of Rust's build system and outlines goals for improving its usability and comprehensibility. It examines why Rust's compilation process is uniquely difficult compared to other programming languages.
The article provides practical advice for maintaining open source projects sustainably, focusing on setting boundaries, automating processes, and managing community expectations to prevent burnout.
wonder
0.0The article discusses the value of maintaining a sense of wonder, describing it as a wonderful thing to possess.
The Rust project faces a significant burnout problem, with many contributors leaving due to overwork. The author describes a cycle where volunteers feel personally responsible for all progress, leading to exhaustion. They suggest treating contributions like a job with boundaries and rotating responsibilities to maintain long-term participation.
The article explains how to build a custom rustc_driver, which is the compiler interface used by tools like Clippy. It discusses the process of creating a custom driver that can analyze and transform Rust code similar to how Clippy works.
GNOME lacks a built-in scheduling feature for Do-Not-Disturb mode, but it can be controlled via the command line using gsettings. The article details a workaround involving a custom script and cron scheduling, while addressing environment variable issues related to DBUS connectivity.
The article discusses various problematic Python coding patterns that can lead to bugs and errors in software development. It examines common pitfalls and anti-patterns that developers should avoid when writing Python code.
tools
0.5The article lists tools that the author currently uses or wants to use in the future. It provides a straightforward inventory of software and utilities without additional commentary.
The article discusses SFTP sandboxing techniques in Unix systems, exploring methods to securely isolate file transfer operations within restricted environments.
The article distinguishes technical debt from technical risk. Technical debt involves updating understanding of a program over time, while technical risk involves sacrificing the ability to make changes for short-term development speed.
The article discusses the challenges of understanding how a program is intended to work and provides guidance on approaching this process without having a mentor available.