Maybe now all the "if IE" conditionals result in a purposely shitty experience, instead of targeting quirks in specific versions.
<!--[if IE]><link rel="stylesheet" type="text/css" href="shitty-on-purpose.css"
Yes, you should remove the CNNIC CA cert (and many others) if you have admin/root over the devices you control. If not, choose a browser that maintains it's own CAs.
I'm planning the same 24 | 30 | 24 monitor setup. Do you run them all on a single video card? DisplayPort for the 30" and dvi/hdmi for the two 24's?
Missing the point. Of course end users don't care. But if the browsers supported DANE and performed their own DNSSEC lookups if the local resolver can't, then DANE could work.
If the destination site doesn't publish their certs and/or designated CAs in DNS, then the old "trust all built-in CAs" will still apply.
Great for small sites, but doesn't work for giant sites like the Google properties.
I didn't know about Mongres, thanks for sharing.
This is the EnterpriseDB blog post comparing performance of Pg and Mongo.
And yeah, hstore is old-school now that JSONB exists.
They still are using NoSQL... until they want to report and extract value from their data, then they'll migrate to an RDBMS.
PostgreSQL is actually a pretty good NoSQL database that you can also use as a kick-ass relational database.
Then use NoSQL instead since you don't care about the structure of your data or how you might query that data to extract value.
Double duh. (tag story with "duh"). Try using a CTE to insert into a history table with the results of another table's delete in MySQL.
You must only be using the most basic of SQL features. Any quick research towards advanced SQL points to Postgres.
Don't you know? Programming is the web.
Aren't you trusting the "owner" of your linux binaries, including your favorite browser, with all of your data traffic?
Your data doesn't pass through a remove VPN. Think of it like tunneling through a loopback device.
Try Mobiwol, the no root firewall, which works as a local VPN so it routes all your traffic through the VPN running on the phone itself, thus giving you ability to allow/deny individual apps from network access (including background vs foreground).
How could it MITM with only the public key? It needs to sign each destination HTTPS site with the private key.
Each install could generate a unique key pair and install a new root cert.
Which HER am I supposed to TWEET?
Aren't you glad you're not getting all the government you pay for now?