Hi all, in this issue I want to share a tip to use multiple Github accounts on same computer.
A SSH key can be added to a single account. When you share same laptop to access both work or personal accounts, you will not be able to clone/push via SSH. In order to clone/push as other account, We need instruct Git to use other SSH key.
Create a file in ~/bin/switch-git
:
ssh -i $HOME/.ssh/[other-key] $1 $2
Whenever you want to switch to your personal git to clone/push, do this before run git command
.
export GIT_SSH=~/bin/switch-git
If you use SSH Agent you may want to also do ssh-add -D
to remove the default SSH key from agent.
Hope it helps you :-). Now let get back to our links.
One letter per month. Started since 2018⁄09. So many advices that I’m sure you will feel right at home
What technologies does it use on the backend? What is the technology stack? What is the system architecture? What are the primary challenges a platform like Facebook, with such a massive number of users, has to face when rolling out & scaling a feature like this?
Most distributed systems guarantee at-least-once delivery. This just means retry and retry. But as a user, at-least-once delivery isn’t really what I want. I want messages to be delivered once. And only once.
On June 6, 2019 Tetris turned 35 years old. To celebrate, the author wrote their own version. No libraries. No frameworks. Just JavaScript. And fun.
What does it mean to look at a “straight from camera” RAW photo file? How do RAW processors like Lightroom change the files after they’re loaded, and are RAW files actually images? Those are some questions we’ll be exploring in this article.
The vertical scrolling effect in the original “The Legend of Zelda” relies on manipulating the NES graphics hardware in a manor likely that was unintended by its designers.
The larger a system, the more Murphy’s law of “what can go wrong, will go wrong” applies. This post is the collection of the practices to reliably operate a large system at Uber.
Browser uses response headers for some permission such as: only allow certain domain iframe you, prevent cross site scripting, force HTTPS, disable full referred link…Another good link on this topic is Content Security Policy - An Introduction
This is the free, online, reduced version. Some inessential chapters are excluded from this version, but in the spirit of this being an education resource, the essentials are present for anyone wanting to learn about data-oriented design.
This series will walk you through building an optimizing compiler from scratch. Hopefully we’ll both learn something along the way. We started out with Scheme, but event
a tool for encouraging best coding practices and helping ensure we’re writing secure Python code.
PythonNode.js tool for optimizing SVG files
get things from one computer to another, safely
a query tool that allows you to join, analyse and transform data from multiple databases and file formats using SQL
Similar to Docker, but instead of running on host kernel and using namespace for resource isolations,
it uses Firecracker VM from AWS and run “container” inside this VM. Magic and promise seamless Docker UX.
Simply replace docker run
with ignite run
.
BetterDev Link
Every Monday