Perhaps you actually get to code only for 1/3 of your working time. In a day job situation, half of the time is spent on meeting and communication and other miscellaneous, non-nondescript stuff. Sometimes, you might wonder, “what i've actually been doing in the past few months?”. You might have worked in the software industry as a programer for years. The other problem is about writing a script to zip up a directory. Subversion (svn) changing capital letters to lower case. In the past week, another 2 such situation happened. But in each case, i ends up spending hours or half of a day. If you know the technologies well, usually you'd imagine it's just 5 to 10 minutes job. In all the above cases, they are typically about installing a package, setting a preference, compress a file, get spelling checker to work, setting a environment variable. Each essay above usually takes 4 hours to write.) (and it is quite time consuming to document this experience. AutoHotkey Path Problem Windows Shortcut Path.URL Percent Encoding and Ampersand Char.Software Dependency Complexity: Fink, Unison.Complexity of Software Engineering Emacs, Unicode, Unison.A Exhibition of Tech Geekers Incompetence: Emacs whitespace-mode. In the past few years, i tried to write a account of it whenever this happened to me. Usually, something that's conceptually trivial, something you think can be done in 10 minutes, ends up hours. In the past few years, i've been wondering why software engineering is so cumbersome and time consuming. But LOIC is the proper tool to carry out people's voices, in a meaningful and controlled way. Of course, some DDOS attack are from rogue software (viruses trojan horses) that hijacks user's machine without user knowning. (the “attack” basically just means visiting the site repeatedly to drive their server out of handling request capacity this is known as DDOS (Distributed Denial Of Service) attack) (for Low Orbit Ion Cannon).īasically, it's a software application you can download, so that you can participate in a coordinated attack against big sites. I thought it's from viruses (trojan horses), whic got to people's machines from games or pirated software downloads, without user being aware. They seem to have twitter account Īlso, i've always wondered how those DDOS attack gets their machines. In some sense, that's a essential ingredient to keep some power to people, a form of movement. This is in fact how alliances work.Īlso, orgs like the Operation Payback are made of individuals, like you and me, where each of us make decisions individually, as opposed to big organizations that are typically mindless power controlled by a few. So, in many circumstances, you have to support B. B is your possible chance to prevent E becoming more powerful. You don't really like B, but you think E is by far the most evil. However, in this world, much of it is political struggle.įor example, there are 2 politicians B and E. Typically, big organizations that cracks down on piracy networks. Recording Industry Association of America (RIAA), Motion Picture Association of America (MPAA), Warner Brothers, and also Scientology, etc. In the past, they've attacked sites such as They DDOS attacked sites of Visa, MasterandCard, Paypal, Amazon, and some government sites. Recently, they launched attack on those who attacked Wikileak. Windows Taskbar/StartMenu/Desktop folder Locationsĭiscovered.Because it change keys whenever you add or delete a icon there. Like this: disable the bunch of launch app keys setup by Quick Launch. So, today, i disabled them all, and instead, use AutoHotkey to create hotkeys myself. Whenever you create a new icon, or remove one, all your hotkey changes. The total number of hotkeys auto-created are limited to 10, from 1 to 9 and 0. The first icon will have hotkey ❖ Window+ 1, and second ❖ Window+ 2, etc. Whenever you put a icon there, a hotkey is automatically created for you. Basically, you can drag icons there and you can click icons there to launch apps. Windows Vista has this Quick Launch toolbar.
0 Comments
Leave a Reply. |