It’s Memon Mondays!
This is a late Monday edition of Memon Mondays. First of all, Eid Mubarak! Here is what’s cool on internet this week.
Wiper — A browser add-on to strip search results from 'blacklisted' URLs on GoogleIf you search for something regularly and see spam websites at the top, this plugin should help. A Firefox plugin that strips Google results based on your custom blacklist.
“I think my BBQ just offered to be my default browser?”This person’s smart BBQ grill (I know right) is trying to be their phone’s default browser. Weird world.
Unc0ver — Jailbreak for iOS 11.0 to 13.5It’s been a long time since I jailbreaked an iOS device. Back in the day (before iOS 7), jailbreak was a standard practice and a must-have since the iOS was very limited. Cydia was used more than the official App Store. These days, I am not even sure how to DFU an iPhone.
Unc0ver; released this week, can jailbreak literally all current iOS devices. Looks awesome! I haven’t tried it yet but I am tempted by the iOS themes and UI mods.
Good coders borrow, great coders stealUs developers copy code from internet all the time. It’s part of our workflow. But copying code from internet is a double-edged sword. This article talks about this and the right approach to it.
The most copied StackOverflow snippetMentioned in the article above, this is the most copied snippet from StackOverflow. And ironically it has a bug!
Write Libraries, Not FrameworksIf you have ever open-sourced some code with the intention that it will be useful for others as well, this article is for you. You make a critical decision when starting a new open-source project: to make it a library or a framework.
How the biggest consumer apps got their first 1,000 usersThis is a compilation of how popular apps got their initial users. If you have ever tried getting users, it’s hard! So this is an interesting research.
—————————————————That’s it friends! Be safe, stay home, and wash your hands.Also inbox me if you got something cool to share!✌️~Asad
For your security, we need to re-authenticate you.
Click the link we sent to , or click here to log in.