I help people exploit and improve Drupal, a free content management system. Software which restricts its users cannot match the potential of software which gives its users control. Participating in the free software community ensures that the code you invest in has a secure future.
If the following MySQL error prevents you from creating or altering a table, you can get the statement to execute successfully by disabling strict mode:
1071 Specified key was too long; max key length is 1000 bytes
Disabling strict mode will change the error to a warning. The key will be shortened to fit the maximum key length. This is fine if you don’t need the full value in the index.
Cryptography is legally protected by the right to free speech. It is also protected by the right to keep and bear arms. Until 2000, cryptography was considered a weapon under United States law, and exporting strong encryption from the United States was banned. The same arguments used to defend gun ownership also apply to the right to use encryption to transmit and store information.
I have often heard (and repeated) the claim that Christmas was originally a pagan holiday. It made sense to me because it is not mentioned in the Bible. Until now, I had assumed that the claim that Christmas was a pagan holiday would not be made unless it had a factual basis.
Some people who believe this claim argue against Christmas decorations in church, so I decided to check the facts for myself. I do not expect facts alone to settle the argument. I just hope facts will help arguments to be based on truth.
Safari does not offer to open downloaded files by default. Black Manticore explains how to create a configuration file that lists downloaded file extensions allowed to open automatically.
If you are trying to connect a device that cannot display a Wi-Fi login screen to a Wi-Fi network that requires a login screen, you will need to spoof the MAC address of the device you are trying to connect on a device that can display a login screen.
A MAC address is a hardware ID that identifies a device on a network. Here’s how to spoof the MAC address on a Mac computer.
I work for Cognizant, a technology consulting company. My division, Cognizant Softvision, provides digital engineering services to clients. What this means in practice is that I am embedded in a client’s engineering team. This works fine for me, but I have wondered how the business model works for Cognizant and for clients and whether it limits my earnings.