2 July 2018 (ME) — I send an email to Deezer Support requesting access to my personal data in an electronic form, according to GDPR Article 15.
4 July 2018 (DEEZER) — They send me my username and email address and say that it’s all the personal data they have stored. In the next paragraph they say that they also have the IP address history, listening history and payment history, and that I can request a copy of that data (didn’t they just say that all my personal data was my name?).
4 July 2018 (ME) — I confirm that…
A few months ago I left Gmail as my primary email provider and migrated to FastMail.com. The original cause of the decision was the fact that Google announced it was going to kill Inbox, but at the same time I started to realize that Google had too much power on the Internet.
If you think about it, Google, a single private company, owns and controls:
I’ve recently started porting a REST API to .NET Core using the ASP.NET Core MVC framework, and one of the requirements is to keep the JSON response structure very similar to the one of the old project, that was written using another language and web framework.
The easiest part is returning response data when the request is successful. In this case, we can call the
Ok() method with the response data we want to send back, and the method will generate an
OkResult , taking care of content negotiation of the payload (which means choosing JSON, XML, etc.), …
Utilizzare il protocollo HTTPS per la sicurezza dei siti web è importante, ma non solo sulle pagine di login dove si inseriscono indirizzi email e password. Anche le cosiddette “landing page”, cioè quelle in cui l’utente arriva quando apre un sito web, devono essere protette. Il motivo è che tutto ciò che viene trasmesso su HTTP è qualcosa di cui non ci si può fidare. Immaginate un sito web che ha una homepage in HTTP e un link “Premi qui per accedere”. Ci possiamo fidare di quel link? No…
Ho controllato i siti web dei principali operatori di telefonia fissa…
A mezzanotte del 12 gennaio 2018 è uscito il nuovo album di Francesca Michielin, dal titolo “2640”, e come capita per ogni nuova uscita di una certa rilevanza inizia la corsa alla trascrizione del testo dei brani contenuti nell’album. Il primo che arriva è quello che finisce prima in alto nei risultati di Google.
A mezzanotte e dieci minuti inizio quindi a trascrivere il testo di alcune canzoni, e decido di farlo su Genius.com, una piattaforma di trascrizione a cui sono particolarmente affezionato per il modello collaborativo sullo stile di Wikipedia che propone.
If you have deployed multiple servers on DigitalOcean or Vultr, you probably know that every server can be provided with a private IP address that is associated with the private network of the datacenter. This is great, because it allows to deploy distributed services (like databases) that communicate with each other with a latency that is close to zero.
The “issue” is that the private network is shared: that means that in the same subnet there are hundreds and possibly thousands of other servers. So at some point you’ll want to set up a Virtual Private Network (VPN) between your…
So you need to transfer your text messages from a Windows Phone device to an Android one, right? And you realized there’s no simple solution for doing that?
The steps in this guide will make it a bit simpler for you. Note that there are many ways of doing this, so this is just one of them, the one that worked almost flawlessly in my case.
This guide will be divided in three parts:
Before to start, let’s make requirements clear. You don’t need both the devices at the…
Periscope has been out for a few months now. Initially available for iOS only, there‘s now an official client for Android too. There’s no support for other operating systems, but they do have a web interface with the ability to watch Periscope streams, as long as you have the direct link to the stream.
It’s easy to get one. Just go on Twitter and search for the hashtag #periscope. You’ll find hundreds of new streams shared every minute.
Let’s take a random one:
The part of the URL after the /w/ path is what they call the Token ID…
A recent analysis showed that there are at least 30.000 instances of MongoDB left unsecured on the Internet, meaning that anyone can access the data without any kind of authentication.
The official MongoDB documentation might feel a little bit complicated on how to properly setup authentication on a MongoDB instance, so this article will hopefully help with an initial basic configuration.
NOTE: this article was updated multiple times, particularly in March 2018 for a check for compatibility with MongoDB 3.6.x, and in March 2019 for compatibility with MongoDB 4.0. The instructions should actually be the same when using any MongoDB…
If you have an USB drive or an hard disk with a XFS filesystem, you’ll discover that Windows cannot read it. When you plug the drive, you’ll get a not-so-nice popup asking you to format the disk.
That’s because XFS is a file system adopted by Linux, and Windows doesn’t have support for it.
If you’d like to avoid spending money on software that is able to read the XFS file system, you can think about installing any distribution of Linux on your computer.
Here are the steps for doing it with an Ubuntu virtual machine on VirtualBox. We are…