@GIMP A certain behavior of GIMP annoyed me, so I decided to create an issue/feature request on improving UI/UX.
This is what I did:
I would feel better if this whole process required less interactions :/
@GIMP A certain behavior of GIMP annoyed me, so I decided to create an issue/feature request on improving UI/UX.
This is what I did:
I would feel better if this whole process required less interactions :/
How to explain zero-knowledge protocols to your children
Must not contain the characters <, > or spaces.
account.docusign.com
Do I get it correctly, that you disallow < and > symbols because you display plaintext passwords on HTML pages/other XML documents without proper encoding?
Do you use plaintext passwords for filenames (surely <, > and spaces are bad options for filenames)?
What could be the reasons to prohibit these symbols?
My first GNU/Linux distro was Debian.
Somewhere before 2015-02-16, I tried to install Debian as a second OS (dual boot) in addition to Windows 7 on my personal laptop... but failed to do so, meaning that I only got Debian and couldn't run Windows or get my old files :(
It was painful to not know if I can or cannot recover my data.
So in the next few days (before 2015-02-19) I've reinstalled Debian. This time I've reformatted my disk, so that old data won't be available for sure (I've probably formatted the disk during the first installation, though).
Later I managed to install Windows 7 and set up dual boot (achievement unlocked), but with all my data lost there were no many things keeping me in Windows. So eventually I have removed Windows and was only using Debian GNU/Linux until I bought a new laptop (with no OS) and installed Arch Linux on it.
Thus, I was using Debian since I was 15 for roughly 3β4 years.
I've completed 8 courses in google cybersecurity certificate series. It took me 3 months.
https://www.credly.com/badges/338eceeb-ffbf-41f8-9955-3a37a05f60e6/public_url
Those who earn the Google Cybersecurity Certificate have completed eight courses, developed by Google, that include hands-on, practice-based assessments and are designed to prepare them for entry-level roles in cybersecurity. They are competent in beginner-level Python, Linux, SQL, Security Information and Event Management (SIEM) tools, and Intrusion Detection Systems (IDS). They know how to identify common cybersecurity risks, threats, and vulnerabilities, as well as the techniques to mitigate.
The irony is that they DO tell about PEP-8 in the next module, item "Code readability": https://www.coursera.org/learn/automate-cybersecurity-tasks-with-python/lecture/0pAlc/code-readability

They also explain in this video that it's important to write comments, to make code easier to understand for other people and for future self... The example is on the picture 
Video created by Google for the course "Automate Cybersecurity Tasks with Python". You will expand your ability to work with Python. You'll learn about pre-built and user-defined Python functions. You'll also explore how modules help provide ...
Today I've learned that in Python arguments and parameters are different things. I used to use these terms interchangeably.
In short: parameters are the names that you use in the function definition, and arguments are the values that you pass to the function when you call it.
So, turns out, arguments do not always become exact values of function parameters β namely, when you use var-positional and var-keyword parameters (?) According to the python.org's example,
def func(**kwargs):
pass
func(foo='bar')
here the argument is 'bar', but the parameter is kwargs. During the call, the parameter's value is {'foo': 'bar'}.
Another demo how to use booleans π
count = 0
login_status = True
while login_status == True:
print("Try again.")
count = count + 1
if count == 4:
login_status = False
Learn online and earn valuable credentials from top universities like Yale, Michigan, Stanford, and leading companies like Google and IBM. Join Coursera for free and transform your career with degrees, certificates, Specializations, & MOOCs in data science, computer science, business, and dozens of other topics.
For clarity, according to PEP-8:
Donβt compare boolean values to True or False using ==:
# Correct:
if greeting:
Wrong:
if greeting == True:
Worse:
Wrong:
if greeting is True:
(BTW, is it different in other languages?)