Language Selection

English French German Italian Portuguese Spanish

Great News for Start of the Week: The H is Back!

Filed under
News

“The H-Online UK archive appears to be up again,” said David Gerard from Wikipedia, “with old URLs working.” Fantastic!

Read more ►

Only www.h-online.com works,

Only www.h-online.com works, h-online.com redirects to heise.de, still good.

.htaccess configuration

They would not need to register an additional domain, so it's probably just a configuration issue they need to be told about.

heise.de

Well, still good, but I don't think my two years of high school German is going to allow me to read it.

But I'm happy about the return of heise online. It was always on my browser bookmarks toolbar before their demise.

Use www.h-online.com, not

Use www.h-online.com, not h-online.com.
if you really want to read heise.de run it through google translate, it does a bearable job.

Wikipedia

What's important is that search engines crawl all their articles and links from many sites, including Wikipedia, are not broken anymore.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Leftovers: Ubuntu

Web browsers' updates

Development News

  • Git for design projects
  • Updating POSIX
    To the first point, many people seem unaware that POSIX is an actual set of standards - IEEE 1003.1 in several variations, plus descendants. These standards cover a lot more than just operations on files, and technically "POSIX" only refers to systems that have passed a set of conformance tests covering all of those. Nonetheless, people often use "POSIX" to mean only the section dealing with file operations, and only in a loose sense of things that implement something like the standard without having been tested against it. Many systems, notably including Linux, pretty explicitly do not claim to comply with the actual standard.
  • Delete Your Dead Code!
    A few days ago, Ned Batchelder's post on deleting code made the rounds on HN, even though it was originally written in 2002. Here I want to echo a few of Ned's points, and take a stronger stance than he did: delete code as soon as you know you don't need it any more, no questions asked. I'll also offer some tips from the trenches for how to identify candidate dead code. This is the first in a series on eating your vegetables in software engineering, on good, healthy practices for a happy and successful codebase. I don't (yet) know how long the series will be, so please stay tuned!

Security Leftovers

  • 66% of USB Flash Drives infected – don’t trust a stray [Ed: Windows]
    The problem is that the OS will automatically run a program that can install malware from a USB stick.
  • Dental Assn Mails Malware to Members
    The domain is used by crooks to infect visitors with malware that lets the attackers gain full control of the infected Windows computer.
  • Slack bot token leakage exposing business critical information
    Developers are leaking access tokens for Slack widely on GitHub, in public repositories, support tickets and public gists. They are extremely easy to find due to their structure. It is clear that the knowledge about what these tokens can be used for with malicious intent is not on top of people’s minds…yet. The Detectify team shows the impact, with examples, and explains how this could be prevented.