RSS feed [root] /




login:

password:

title search:




 


Sun Jul 23 22:00:11 HKT 2017



(google search) (amazon search)
second
download zip of files only

Sat Aug 19 20:27:10 HKT 2017 From /gallery/Home/YimKan/htc

IMAG0120



(google search) (amazon search)


Sat Aug 19 20:27:09 HKT 2017 From /gallery/Home/YimKan/htc

IMAG0119



(google search) (amazon search)


Sat Aug 19 20:11:26 HKT 2017 From /gallery/Home/YimKan/htc

VIDEO0042



(google search) (amazon search)


Sat Aug 19 20:10:34 HKT 2017 From /gallery/Home/YimKan/htc

VIDEO0041



(google search) (amazon search)


Sat Aug 19 20:09:30 HKT 2017 From /gallery/Home/YimKan/htc

IMAG0118



(google search) (amazon search)


Sat Aug 19 20:08:45 HKT 2017 From /gallery/Home/YimKan/htc

IMAG0117



(google search) (amazon search)


Wed Aug 16 18:07:26 HKT 2017 From /gallery/Home/YimKan/htc

IMAG0116



(google search) (amazon search)


Wed Aug 16 18:07:20 HKT 2017 From /gallery/Home/YimKan/htc

IMAG0115



(google search) (amazon search)


Wed Aug 16 17:07:52 HKT 2017 From /weblog/science

plant


mushrooms - http://list25.com/25-most-bizarre-mushrooms-you-need-to-see/

dangerous-plants - http://list25.com[..]us-plants-that-could-seriously-hurt-you/

Amber - http://www.zmescience.com/science/long-process-amber-creation

Rock - http://www.zmescience.com[..]her/feature-post/rock-cycle-geoloby-abc/

What is the Wilson Cycle, builder and slayer of supercontinents? - http://www.zmescience.com/science/what-is-wilson-cycle/

clouds - http://www.zmescience.com/science/types-of-clouds/

What is THC: the main psychoactive ingredient in marijuana - http://www.zmescience.com/science/what-is-thc-433/

oldest tree - http://www.zmescience.com/science/old-oldest-tree

(google search) (amazon search)


Mon Aug 14 21:30:59 HKT 2017 From /weblog/learning

maths


How to learn maths? Make a story about it - https://hackernoon.com[..]not-to-memorise-mathematics-98fef71aefcf

(google search) (amazon search)


Wed Aug 09 11:37:20 HKT 2017 From /weblog/design

null


Use present and absent rather than NULL - http://binkley.blogspot.com/2012/01/better-than-null.html

Propose of enhancement, null handelers and null reference - http://shemnon.com[..]01/null-handelers-and-null-refere-1.html

How null breaks polymorphism - http://eureka3d.com[..]s-polymorphism-or-the-problem-with-null/ http://eureka3d.com[..]orphism-or-the-problem-with-null-part-2/

Discussion about forbid NULL as parameter and return - http://javablog.co.uk[..]5/07/null-parameters-and-returning-null/

Default object in C# - http://www.kodefuguru.com[..]t/2012/09/25/Default-Objects-with-C.aspx

Discussion about using optional - http://blog.jooq.org/2015/08/20/divided-we-stand-optional/

Some suggest about do something better than use null - https://blog.jetbrains.com/idea/2017/08/code-smells-null

(google search) (amazon search)


Wed Aug 09 00:23:01 HKT 2017 From /weblog/career

productivity


Links of tips of how to be a productivity person - http://freelanceswitch.com[..]-read-productivity-tips-for-freelancers/

Ten ways to ensure that you finish work on time

1. Ensure that you learn from your calls
2. Make sure that you complete an entry for the knowledge base
3. Make sure that the users understand the help desk opening hours.
4. Ensure that you deal with calls effectively.
5. Cut out the unnecessary chatter.
6. Don’t feel guilty about finishing at your appointed time.
7. Organize your day so that the urgent stuff gets done first,
8. Start on time.
9. Some people think that the boss will be impressed by seeing you stay late. A good boss will not be fooled by this
10. A recent survey showed that the longer you stay at work the more your efficiency declines.

- http://blogs.techrepublic.com.com/helpdesk/?p=968

http://manwithnoblog.com[..]0/01/14/improving-your-listening-skills/

http://www.dextronet.com[..]0-best-tricks-of-fooling-myself-to-work/

Don't denial what really happening - http://www.michelemmartin.com[..]blog/2015/08/why-denial-doesnt-work.html

Isolation, Bimodal, habit and rest - https://medium.com[..]roduce-deep-meaningful-work-d9aafc3d32e3

Count 5 second before start - https://betterhumans.coach.me[..]done-with-the-5-second-rule-b7abea890087

(google search) (amazon search)


Tue Aug 08 22:57:56 HKT 2017 From /weblog/software_engineering/SCM

branch


Why merge often - http://queue.acm.org/detail.cfm?id=1643030

http://www.cmcrossroads.com[..]/cgi-bin/cmwiki/view/CM/BranchYesMergeNo

http://paulhammant.com/2013/12/04/what_is_your_branching_model

A lot of resource here - http://www.cmcrossroads.com[..]i-bin/cmwiki/view/CM/BranchingAndMerging

At my company, we tag each CVS module and we use those tags to build releases. That way, we know exactly which code versions each deployment has. Also, developers can check in code at any point while controlling when they release it.

Branches are a major headache, which I avoid whenever possible. You have to worry about maintaining and testing each branch, along with merging changes. I prefer to release the latest and greatest code to each customer. If different customers require different behavior, if statements and configuration files are a lot better than CVS branches.

Branches do make sense if you want to release a minor change to an old release, but upgrading the entire code base is risky. However, high-quality code and testing should reduce that risk.

http://discuss.joelonsoftware.com[..]arent=16312&ixDiscussGroup=3&cReplies=11

Subversion branching technique and tips - http://binkley.blogspot.com[..]version-best-practices-branching_01.html http://www.dehora.net[..]version_tips_dealing_with_branches.html/

Another discussion - http://www.codinghorror.com/blog/archives/000968.html

Branch visualization - http://codicesoftware.blogspot.com[..]07/05/linus-torvalds-on-git-and-scm.html http://www.youtube.com/watch?v=CABIi-Eu2zA

One way of manage branching and merging, the summary is, frequency create new branch for pre-merge instead of one time big merge - http://designbygravity.wordpress.com[..]old-you-about-svn-branching-and-merging/ My colleagues suggest subversion merge tracking can solve the problem without that pre-merge, but I am not sure how that can work... http://blogs.open.collab.net/svn/2007/09/what-subversion.html

No branch? https://cacm.acm.org[..]-of-code-in-a-single-repository/fulltext http://www.infoq.com[..]s/2017/08/How-Google-build-Web-framework

(google search) (amazon search)


Tue Aug 08 18:12:08 HKT 2017 From /weblog/design/distribute

event


Event Bus Implementation(s) - https://hackernoon.com/event-bus-implementation-s-d2854a9fafd5 http://www.infoq.com[..]2017/08/Summary-event-bus-implementation

(google search) (amazon search)


Tue Aug 08 09:54:14 HKT 2017 From /weblog/security

crack


How to use basic UNIX tool to steal other facebook identity - http://blog.mostof.it/how-to-steal-a-facebook-identity/

More on BGP Attacks - http://blog.wired.com/27bstroke6/2008/08/how-to-intercep.html

Discussion of crack protection - http://discuss.joelonsoftware.com/default.asp?design.4.579670 http://www.focusoncode.com/exe-packers-crypters-and-compressors/ , introduce tools - http://www.pelock.com/

Ten Immutable Laws of Security
Law #1: If a bad guy can persuade you to run his program on your computer, it's not your computer anymore
Law #2: If a bad guy can alter the operating system on your computer, it's not your computer anymore
Law #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore
Law #4: If you allow a bad guy to upload programs to your website, it's not your website any more
Law #5: Weak passwords trump strong security
Law #6: A computer is only as secure as the administrator is trustworthy
Law #7: Encrypted data is only as secure as the decryption key
Law #8: An out of date virus scanner is only marginally better than no virus scanner at all
Law #9: Absolute anonymity isn't practical, in real life or on the Web
Law #10: Technology is not a panacea

http://www.microsoft.com[..]s/security/essays/10imlaws.mspx?mfr=true

An example of buffer overflow attack - http://www.thegeekstuff.com/2013/06/buffer-overflow/

hack yourself! - https://blog.codinghorror.com/hacker-hack-thyself/

(google search) (amazon search)


Sun Aug 06 17:21:16 HKT 2017 From /weblog/unix/script

text


10 awk tips - http://www.catonmat.net/blog/ten-awk-tips-tricks-and-pitfalls/

8 Powerful Awk Built-in Variables – FS, OFS, RS, ORS, NR, NF, FILENAME, FNR - http://www.thegeekstuff.com[..]iables-fs-ofs-rs-ors-nr-nf-filename-fnr/

Tutorial of text editing commands - http://www.ibm.com[..]works/aix/library/au-unixtext/index.html

wc and nl tutorial - http://www.thegeekstuff.com/2013/02/wc-nl-examples/ https://enkipro.com/insight/558ac712249a234c00842b68

tips for uniq, like show only items have duplications - http://www.thegeekstuff.com/2013/05/uniq-command-examples/

Tips of "cat", include display by column and by delimiter - http://www.thegeekstuff.com/2013/06/cut-command-examples/

Using lynx to convert HTML to text - https://enkipro.com/insight/558aaea45800843200bca364

(google search) (amazon search)


Sun Aug 06 17:20:16 HKT 2017 From /weblog/unix/script

file


Various ways to working with file - http://www.catonmat.net/blog/bash-one-liners-explained-part-one/

Use truncate to pad the file size up - http://www.lainoox.com/truncate-shrink-extend-files/

Making a file unalterable with chattr - https://enkipro.com/insight/558ac712249a234c00842b68

(google search) (amazon search)


Sun Aug 06 16:15:20 HKT 2017 From /weblog/trip

hk_beach


周末熱辣辣 落水消暑! 11個環保署評定「一級」靚水質 香港沙灘 - http://www.weekendhk.com[..]%E7%B4%9A-%E7%92%B0%E4%BF%9D%E7%BD%B2/2/

(google search) (amazon search)


Sun Aug 06 09:37:23 HKT 2017 From /weblog/database/transaction

transaction


Transaction, same as all the concept in computing, is an approach and trade-off - http://www.allthingsdistributed.com[..]d.com/2007/12/eventually_consistent.html

Transaction file system - http://www.infoq.com/news/2008/01/file-systems-transactions http://myjavatricks.com/jtfs.aspx

Explanation about database isolation level - http://highscalability.com[..]-and-their-effects-on-performance-a.html https://begriffs.com[..]08-01-practical-guide-sql-isolation.html

A nice article explain about transaction process - http://www.theserverside.com[..]Nuts-and-Bolts-of-Transaction-Processing

http://vladmihalcea.com[..]guide-to-acid-and-database-transactions/

(google search) (amazon search)


Sat Aug 05 00:18:58 HKT 2017 From /weblog/entertainment

music


Prince - http://list25.com[..]-the-artist-you-knew-as-prince/?view=all

elvis-presley - http://list25.com[..]ting-facts-about-elvis-presley/?view=all

george-michael - http://list25.com[..]-not-know-about-george-michael/?view=all

【傾聽音樂】中世紀音樂是宗教的奴僕,還是高貴的婢女 - https://thestandnews.com[..]%98%E8%B2%B4%E7%9A%84%E5%A9%A2%E5%A5%B3/

(google search) (amazon search)


Fri Aug 04 23:45:53 HKT 2017 From /weblog/trip/camping

tips


http://list25.com[..]ng-hacks-that-are-truly-genius/?view=all

8字結 - http://www.ropelab.com.au/figure-8-descenders/

http://list25.com[..]ke-your-weekend-more-enjoyable/?view=all

【防蚊香包】
材料:小茴香、艾葉、白芷、薄荷、石菖蒲、藿香各10克
做法:將所有材料混合均勻,放在紗布袋內,可隨身攜帶或放在多蚊處驅蚊
*孕婦及皮膚敏感人士忌用

【止痕外洗方】
材料:地膚子、土茯苓、白蘚皮、紫草各20克
做法:將材料連同5碗水,用中火煲30分鐘,待暖後外洗患處
*孕婦及皮膚敏感人士忌用
http://hk.apple.nextmedia.com/realtime/news/20160520/55106709

https://www.outsideonline.com/2217271/20-lost-arts-outdoors

(google search) (amazon search)


Thu Aug 03 18:22:14 HKT 2017 From /weblog/design

refactoring


http://c2.com/cgi/wiki?RefactoringLanguage

Refactoring to Patterns Catalog - http://www.industriallogic.com/xp/refactoring/catalog.html

Article talk about the book: http://www.oreillynet.com/ruby/blog/2006/03/transformation.html

Catagories smell into "smell in class" and "smell between class" - http://www.codinghorror.com/blog/archives/000589.html

Known but good to remind http://www.thecodejunkie.com[..]10/01/6-steps-to-master-refactoring.html

An experience sharing - http://www.javacodegeeks.com[..]m/2011/05/refactor-hudson-god-class.html http://www.peterprovost.org[..]treme-Refactoring-with-Brian-Button.aspx

Refactoring should not introduce bug... - http://jchyip.blogspot.com[..]01/so-why-are-you-refactoring-again.html

A way to have formal refactoring, through Feature Clustering, Rapid Scratch Refactoring and Twisting Classes - http://www.thekua.com[..]rom-michael-feathers-brutal-refactoring/

Not all code change is refactoring - http://parlezuml.com/blog/?postid=850 , and

Some common issues about refactoring code in a team - http://www.rickylui.com[..]/2008/01/28/dont-be-a-refactoring-bigot/ http://blog.joepoon.com[..]01/dangers-of-premature-refactoring.html , beware taking the balance - http://www.makinggoodsoftware.com[..]ith-beautiful-code-the-refactor-syndrome

Refactory if needed - http://dreamhead.blogbus.com/logs/24874404.html

Refactoring, when start, when stop? - http://martinfowler.com/bliki/OpportunisticRefactoring.html

Refactoring metric - http://www.grahambrooks.com[..]rics-based-refactoring-for-cleaner-code/

Getting rid of util class
1) If the family of methods uses different parameters, depending on optional input or representations of the same input, then consider transforming the Helper via a fluent interface using the Builder pattern: from a collection of static methods like Helper.calculate(x), calculate(x, y), calculate(x, z), calculate(y, z) we could easily get to something like newBuilder().with(x).with(y).calculate(). The helper class would then offer behaviours, reduce its list of business methods and provide more flexibility for future extensions. Callers would then use it as internal field for reuse or instantiate it where needed. The helper class (as we knew it) disappeared.
2) If the helper class provides methods which are actually actions for different inputs (but, at this point, for the same domain), consider applying the Command pattern: the caller will actually create the required command (which will handle the necessary input and offer a behaviour) and an invoker will execute it within a certain context. You may get a command implementation for each static method and your code would move from an Helper.calculate(x, y), calculate(z) to something like invoker.calculate(new Action(x, y)). Bye bye helper class.
3) If the helper class provides methods for the same input but different logics, consider applying the Strategy pattern: each static method may easily become a strategy implementation, vanishing the need of its original helper class (replaced by a context component then).
4) If the given set of static methods concerns a certain class hierarchy or a defined collection of components, then consider applying the Visitor pattern: you may get several visitor implementations providing different visit methods which would probably replace partially or entirely the previously existing static methods.
5) If none of the above cases met your criteria, then apply the three most important indicators: your experience, your competences in the given project and common sense.

http://www.refactoringideas.com[..]-to-get-rid-of-helper-and-utils-classes/

Converting forloop to streaming - http://martinfowler.com/articles/refactoring-pipelines.html

Refactoring JavaScript from Sync to Async in Safe Baby-Steps - http://www.natpryce.com/articles/000812.html

code-refactoring-dos-donts - https://jaxenter.com/code-refactoring-dos-donts-135960.html

(google search) (amazon search)


Thu Aug 03 00:35:47 HKT 2017 From /weblog/health/food

vegi


Pros and Cons for vegi - http://thehousenews.com[..]84%E5%BC%8A%E8%88%87%E5%88%A9-%E4%B8%80/

B12 is important - http://www.yimho.com/1821.html

熟吃損失多少維生素? - http://www.healthcare-kingdom.com[..]0%91%E7%B6%AD%E7%94%9F%E7%B4%A0%EF%BC%9F

中國城市人的香椿情結 - http://cn.wsj.com/big5/20140418/rcu180822.asp?source=rss

西蘭花如何幫助身體應對空氣污染 - http://cn.wsj.com/big5/20140613/ren161006.asp?source=rss

13 Easy Ways to Eat More Greens - http://www.webmd.com/food-recipes/ss/slideshow-greens

Recipes that use veggies from garden - http://list25.com[..]s-and-veggies-from-your-garden/?view=all

lutein-veggies-cognitive-protection - http://www.zmescience.com[..]n-veggies-cognitive-protection-01082018/

(google search) (amazon search)



Mon Jul 31 13:57:56 HKT 2017 From /weblog/security

password


Make sure all your passwords are 12 characters or more, Use bcrypt or PBKDF2 exclusively to hash anything you need to be secure. - http://www.codinghorror.com/blog/2012/04/speed-hashing.html

Password is only worked for one time - http://www.mobileread.com/forums/showthread.php?threadid=6462

crack captcha - http://sam.zoy.org/pwntcha/

Java password mask - http://java.sun.com[..]er/technicalArticles/Security/pwordmask/

OpenID resource - http://openid.net/ http://www.arachna.com[..]ge/spidaman/20070225#the_openid_snowball http://developers.sun.com/identity/ http://www.theserverside.com[..]_id=46569&asrc=EM_NLN_2030603&uid=703565

OpenID explain - http://ravichodavarapu.blogspot.com/2007/06/what-is-openid.html

A technique that crack winxp password at 3 min - http://www.infoq.com/news/2007/09/rainbowtables

Using image as password - http://dsc.discovery.com/news/briefs/20060306/password_tec.html

The other interesting idea, Evolving Password - http://www.docuverse.com[..]uid=79730e53-1d30-47ae-98e8-abb55201429b

Passphrase Evangelism - http://www.codinghorror.com/blog/archives/000360.html

Rainbow Hash Cracking - http://www.codinghorror.com/blog/archives/000949.html , add salt (token) to prevent it - http://blog.cfelde.com/2011/04/hashing-passwords/

How to make password harder to be guessed, but I guess there should be simple way to guess "this is fun", other than take 2537 years? - http://www.baekdal.com/tips/password-security-usability

Discussion about if some old suggested rules about still valid or not - http://queue.acm.org/detail.cfm?id=2422416&ref=fullrss

Using quantum for password? - https://www.inside.com.tw/2017/03/01/quantum-key-distribution

Salted Password Hashing - Doing it Right - https://crackstation.net/hashing-security.htm http://www.infoq.com[..]w-to-encrypt-the-user-password-correctly

It sound like outsource is better - https://blog.plan99.net/building-account-systems-f790bf5fdbe0

(google search) (amazon search)