At the beginning of the year, we officially moved from Berlin to Lisbon after finding a nice old apartment not too far from the center of the city.
Our apartment building door, like most around Lisbon, is old and doesn’t work very well. And with many friends coming to visit this summer, I decided to automate the door so that I and my friends can open the door using our mobile phones instead of spending 5 minutes trying to open the door with the key.
Read more “Automated door system”
I am a big fan or Hackernoon, but their sticky header and footer bars are too big and annoying. To fix that, I’ve written a quick TamperMonkey script to remove it.
If you want to run seeders before each test you can use the artisan command in each of your test methods.
Running all seeders with:
Running only one specific seeder:
$this->artisan('db:seed', ['--class' => 'RolesTableSeeder']);
Today I am releasing the second version of my side-project pwdquery. I have spent many hours playing and manipulating the 90GB+ database, creating new scrapers, improving scripts and automating the whole process.
Remember, if you see any of your passwords in there, change immediately!
Hey guys, just wanted to share my current VIM settings.
Copy the vimrc file to ~/.vimrc
Install Vundle from https://github.com/VundleVim/Vundle.vim with:
git clone https://github.com/VundleVim/Vundle.vim.git ~/.vim/bundle/Vundle.vim
Run vim +PluginInstall +qall
It is impressive that even now there are so many big companies with poop password storage solutions! Back in 2013 Adobe had a massive password leak, followed by Google in 2016 among many others.
Not so long ago, a compilation of 1.4 billion emails and passwords have been leaked online via torrent! When I checked that this information wasn’t available on the famous haveibeenpwned.com I decided to quickly build one where people can check if their emails have been compromised. The idea is simple, just type your email and it will check if your password is on the list. The password will be displayed with some *** so that it’s not publically available (but be careful that the leaked file doesn’t hide them!).
You can check it out at https://pwdquery.xyz.