AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Working on a Python project, faced challenges with debugging due to unconventional methods. Reminded of old coding practices using alerts in JavaScript for debugging. Opted to set up Docker and PyCharm for proper debugging environment, highlighting the importance of efficient debugging tools.
Reflecting on the evolution of debugging tools, from using alerts in JavaScript to the introduction of console.log in 2004. Discusses the transition from manual debugging practices to utilizing modern debugging features for improved efficiency.
Comparing traditional debugging methods, like alerts in JavaScript, to modern debugging practices using advanced tools like PyCharm. Emphasizes the importance of investing time in setting up proper debugging environments for efficient code debugging and troubleshooting.
Exploration of debugging practices in software development, highlighting the significance of utilizing advanced tools for efficient debugging. Reflects on personal experiences with debugging methods and the benefits of leveraging modern debugging features.
Efficiently setting up development environments, including using tailored IDEs, is crucial for productivity and code comprehension. The process of configuring IDs for specific languages is likened to an essential part of a developer's role, dating back to the early days of setting up development environments from scratch. Investing time in setting up IDs can significantly impact productivity and facilitate effective debugging, especially in multi-threaded scenarios where IDEs are indispensable.
CWE, managed by the MITRE Corporation since 1999, differs from OWASP by focusing on a broader range of software and hardware vulnerabilities. While OWASP concentrates on web application security with a specific Top 10 list, CWE encompasses a comprehensive list of weaknesses beyond cyber applications, including buffer overflows and hardware vulnerabilities. Assessing trends in CWE's top 25 list reveals consistent upward movers like missing authorization and server-side request forgery, emphasizing the persistence of known vulnerabilities despite advances in technology and tooling.
In this episode Joe introduces us to more security items you should be aware of in the world of CWE’s, Michael bends to the will of Joe and Allen in his favorite portion of the show, and Allen pontificates on the time spent setting up IDE’s and environments.
Pre-warning – probably wouldn’t recommend installing this!
Saw a cool Windows utility called “Windrecorder” that records video and text from your desktop, and lets you rewind and search.
MacOS’s Spotlight is more powerful than you maybe knew
https://www.intego.com/mac-security-blog/spotlight-secrets-15-ways-to-use-spotlight-on-your-mac/
https://beebom.com/spotlight-tips-tricks/
If you’re grep command isn’t working like you thought it should, you might be a victim of content getting kicked out of the buffergrep --line-buffered
iOS – get text from images
https://support.apple.com/guide/iphone/use-live-text-iphcf0b71b0e/ios
Listen to all your favourite podcasts with AI-powered features
Listen to the best highlights from the podcasts you love and dive into the full episode
Hear something you like? Tap your headphones to save it with AI-generated key takeaways
Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more
Listen to all your favourite podcasts with AI-powered features
Listen to the best highlights from the podcasts you love and dive into the full episode