- https://en.wikipedia.org/wiki/Firefly_Lane
- https://de.wikipedia.org/wiki/Immer_für_dich_da
- https://www.imdb.com/title/tt9012876
- the Spanish title: El baile de las luciérnagas – translated to English: The dance of the fireflies
- https://en.wikipedia.org/wiki/Katherine_Heigl
Blog
-
my current series: Firefly Lane
-
URL decoding
URL decoding is the inverse process of URL encoding. It is used to parse query strings or path parameters passed in URLs. It is also used to decode HTML form parameters that are submitted with application/x-www-form-urlencoded MIME format
URLs, as you might know, can only contain a limited set of characters from the US-ASCII character set. These characters include Alphabets (A-Z a-z), Digits (0-9), hyphen (-), underscore (_), tilde (~), and dot (.). Any character outside this allowed set is encoded using URL encoding or Percent encoding.
This is why, it becomes necessary to decode query strings or path parameters passed in URLs to get the actual values.
You can have URLs with umlauts and other characters not listed above shown in your browser – but if you copy that URL to a text area, it gets “URL encoded” – that’s usually not, what I like to have in that text area, e.g. my text editor. Far to often I fixed those URL encoded strings manually – but recently I came across the tool listed above, and I quite like it for this purpose.
-
Microsoft PowerToys
- https://en.wikipedia.org/wiki/Microsoft_PowerToys
- https://learn.microsoft.com/en-gb/windows/powertoys/
- https://learn.microsoft.com/en-gb/windows/powertoys/fancyzones – PowerToys FancyZones – how to split my 4k screen into “zones”
- https://github.com/microsoft/PowerToys
-
getent is a Unix command that helps a user get entries in a number of important text files called databases
The databases it searches in are: ahosts, ahostsv4, ahostsv6, aliases, ethers (Ethernet addresses), group, gshadow, hosts, netgroup, networks, passwd, protocols, rpc, services, and shadow.
-
Microsoft Sysinternals ProcessExplorer: restore the original task manager after replacing it with ProcessExplorer
- https://superuser.com/questions/1320561/restore-the-original-task-manager-after-replacing-it-with-the-sysinternals-proce
- https://learn.microsoft.com/en-us/sysinternals/downloads/sysinternals-suite – includes Process Explorer, the PsTools suite of command-line utilities, and a lot more
- https://learn.microsoft.com/en-us/sysinternals/downloads/process-explorer
- https://learn.microsoft.com/en-us/sysinternals/downloads/pstools – PsTools – suite command-line utilities
-
The Pragmatic Bookshelf: Tracking Personal Finances Using Python by Siddhant Goel – Beancount
Learn how to build a privacy-aware and developer-friendly workflow using Python to keep track of your personal finances.
https://www.pragprog.com/titles/d-sgperfin/tracking-personal-finances-using-python/ -
Unix, Linux: how to do a proper and secure file transfer in a cronjob
I got advised to do sftp with an empty passphrase. I got that working. Was pretty straight forward. But is there a better way? With a non-empty passphrase? But how to deal with that passphrase?
- https://en.wikipedia.org/wiki/ssh-agent
- https://linuxhandbook.com/transfer-files-ssh/
- https://www.tecmint.com/ssh-passwordless-login-using-ssh-keygen-in-5-easy-steps/
- my buzzword web search: ssh file transfer best practice
I do my ordinary SSH handling with an SSH agent, and I feel quite confident with that. But I yet have to find out about best practice of SSH-based “file transfers in the background”.
“sftp with an empty passphrase” is what I use for now.
On the target side the account gets a chroot-ed environment through a directive in sshd_config. But the chroot-ed environment gets linked via “mount –bind” into a useful and not so much restricted environment.