Bookmarks, page 59 of 70
In this tutorial, you’ll set up a Ruby programming environment on your local Linux machine via the command line. Then you’ll test your environment out by wri…
Properly setting up background job processing in production involves quite a few steps. This is an up-to-date, high-level overview of the steps involved in s...
The sudo command is useful for executing commands with privileges usually outside of the scope of your user. This guide will discuss how to edit the configur…
Redis is an in-memory, key-value store known for its flexibility, performance, and wide language support. In this guide, we will demonstrate how to install a…
When you start a new server, there are a few steps that you should take every time to add some basic security and give you a solid foundation. In this guide…
If you want to run a shell command from Ruby and capture its stdout, stderr and return status, check out the Open3.capture3 method. If you'd like to process stdout and stderr data in a streaming fashion, check out Open3.popen3.
A pure JavaScript implementation of git for node and browsers!
Coming soon.
A Gentle Introduction to Prepack, Part 1. GitHub Gist: instantly share code, notes, and snippets.
Stack Overflow for Teams is a secure knowledge sharing platform trusted by the world’s largest community of developers and technologists. We boost team productivity and collaboration through a centralized knowledge base and easy to use, familiar platform.
Use Rails 5 ActionCable channels with React for realtime magic.
Securing Rails ApplicationsThis manual describes common security problems in web applications and how to avoid them with Rails.After reading this guide, you will know: All countermeasures that are highlighted. The concept of sessions in Rails, what to put in there and popular attack methods. How just visiting a site can be a security problem (with CSRF). What you have to pay attention to when working with files or providing an administration interface. How to manage users: Logging in and out and attack methods on all layers. And the most popular injection attack methods.