Find your internet twin!

This site is currently broken for new queries. It seems like some bot hit it and we ran out of exa credits.

Enter your personal website to find others like you. Powered by Exa's "find similar". Built on Val Town.

Similar Sites:

A young man who's studying computer science in college asked me for information regarding how to get an internship in the software industry.

I mostly use this domain for email, but if you’d like to get to know more about me feel free to connect with me on LinkedIn.

I told her that is how I got here and that wasn’t going to help.

I saw this recently in a configuration a customer was using for disaster recovery.

The first two things there are what you are looking for.

This means that for example if your application(s) is reading from/writing to a (log) file, and you delete the file from the shell, the file is not a…

Remember people, when you implement a password, allow the following things:

The solution is to make sure it is created as a symbol like so:

So, to save myself time in the future, here is an example:

View previous queries