XOrg (X or X11)

Summary X and X11 are basically interchangeable references to the client/server windowing system developed by MIT in the 80’s. Xorg is the current implementation of this used on most linux distros today (though Ubuntu is working on migrating to a different system called Wayland). Configuring GPU Graphics card to use with XOrg For the higher resoltion monitors, e.g. like 4k monitors, it might be required to configurations to use graphics card and it right drivers to get the monitor to display right resolutions....

1 min · Jaaved Khan

ZSH

Plugins position ease box interval due front 2.20 2 1.00 2021-08-08T07:51:48Z fzf https://github.com/junegunn/fzf#installation sudo apt install fzf https://github.com/ohmyzsh/ohmyzsh/tree/master/plugins/fzf good tutorial Useful commands: CTRL + R -> command history CTRL + T -> search files in current directory ALT+C -> change directory kill -9 you can select process to send kill command to Ctrl + D -> exit After export FZF_COMPLETION_TRIGGER='**'...

1 min · Jaaved Khan

What are credit and debit notes?

Both debit notes and credit notes are official accounting documents, both used by businesses but for different purposes. Separate from an invoice, these notes let buyers know how much existing business credit they have or conversely, how much they still owe (udhari aur baqaya). They’re also critical to shipment tracking, payments due or if any credit remains on the account. Debit note or debit memo A debit note, or a debit memo, is a document issued by a seller to a buyer to notify them of current debt obligations....

1 min · Jaaved Khan

web-mode

Debugging Issue: while using replace feature, it was just changing first instance and the replace session was stoping error: “Match data clobbered by buffer modification hooks” Solution: was not good solution because this disable all the change hook in buffer unintended conseqeunce: when a line is commented it’s face won’t change. (setq inhibit-modification-hooks nil);; If this variable is non-nil, all of the change hooks are disabled; none of them run....

1 min · Jaaved Khan

Volumes

Volumnes On-disk files in a container are ephemeral, which presents some problems for non-trivial applications when running in containers. One problem is the loss of files when a container crashes. The kubelet restarts the container but with a clean state. A second problem occurs when sharing files between containers running together in a Pod. The Kubernetes volume abstraction solves both of these problems. Familiarity with Pods is suggested. Kubernetes supports many types of volumes....

2 min · Jaaved Khan

Unix socket vs IP socket(TCP/IP)

Summary ref A UNIX socket, AKA Unix Domain Socket, is an inter-process communication mechanism that allows bidirectional data exchange between processes running on the same machine. IP sockets (especially TCP/IP sockets) are a mechanism allowing communication between processes over the network. In some cases, you can use TCP/IP sockets to talk with processes running on the same computer (by using the loopback interface). UNIX domain sockets know that they’re executing on the same system, so they can avoid some checks and operations (like routing); which makes them faster and lighter than IP sockets....

1 min · Jaaved Khan

Zettelkasten Method

Zettelkasten in German means Slip Box. It is a method or organize notes. Zettekasten examples #+DOWNLOADED: screenshot @ 2021-02-25 21:47:51

1 min · jaavedkhan

XSS

Summary This attack is dangerous than , much greater damage can be done. Details position ease box interval due front 2.5 0 0 2021-09-12T07:48:27Z Cross-site scripting (XSS) is a type of web application security vulnerability typically found in web applications. XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy....

1 min · Jaaved Khan

Wagtail

Summary

1 min · Jaaved Khan

User Stories

Summary Consists of tasks. Reminders to have conversations with your clients. Good user stories consists of Card (title on notecards) Converstation (with clients) Confirmation (acceptance tests) What is user story? link User stories are short, simple descriptions of a feature told from the perspective of the person who desires the new capability, usually a user or customer of the system. They typically follow a simple template:...

2 min · Jaaved Khan