Most companies have a method of storing passwords and configuration details in a configuration file. For programmers working on on DBIx::Class, this usually means writing your own functions to load a configuration file and supplying them to
->connect(). If you're working on something like a web framework, chances are you're writing something similar like Dancer's Plugin::DBIC or Catalyst's Model::DBIC::Schema.
DBIx::Class::Schema::Config can be added to any DBIC Schema to allow it to connect to a database with pre-configured credentials in any format that Config::Any recognizes, takes one additional line of code in a schema file, one change to your
->connect() statement, and takes less than a minute to configure after it's been instal Read More...
Not every module is created perfectly and you may want to review the code you're loading into your project, identify bugs or generally poke around.
Stalker is an irssi plugin to correlate information on an IRC network and discover users' previously used nicknames. The concept is fairly straightforward: given a nickname identify previously used hostnames. From those hostnames, extract all nicknames they have used. Repeat until you have identified all nicknames a user might have used. The advantage of this method over the more traditional given a hostname identify all nicknames it has used is that you can identify nicknames across hostmask address Read More... Comments.
The ability to string together data between processes and controlling where it comes from and goes to is ultimately a very large aspect of what makes Linux and Unix systems great. In this article we will take a look at the methods for doing so as well as describe where this data is coming from and going. A solid understanding of redirection and file descriptors is mandatory for any systems administrator or programmer working with a UNIX-like syst Read More... Comments.