I'm not affiliated with that good project but I have put up a site to do with it. The site shows PG's catalog (or most of it) with forms for searching by title or author. The source code for it is on tildegit.
Since anything on the public internet comes under siege from scripts and bots I don't know how well it'll survive. Give it a try if you feel like a free e-book.
The captchas on the signup form were too difficult for me. I began to suspect that I might really be a bot that think it's human. But within minutes of my asking about those captchas on irc, ben helped me by removing the captcha from the form!
So now I have my little space on tildegit. My thanks to ben and the tildeverse in general.
Here is a toy Makefile:
reboot-universe @echo "Abolishing spacetime..." @echo "Rebooting..."
Not very safe. If you make that target by mistake, it says
$ make reboot-universe Abolishing spacetime... Rebooting...
and where are you now? There is one way to make the Makefile a little safer, like this:
dangerous: ifndef DANGEROUS $(error Refusing to continue without DANGEROUS set.) endif reboot-universe: dangerous @echo "Abolishing spacetime..." @echo "Rebooting..."
Now you have to try harder to destroy the Universe.
$ make reboot-universe Makefile:4: *** Refusing to continue without DANGEROUS set.. Stop. $ $ make DANGEROUS=y reboot-universe Abolishing spacetime... Rebooting...
I've found it useful in stopping me running destructive targets by mistake, e.g. to drop a database or wipe out its data. You can make "dangerous" a dependency of as many make targets as you like. If there's an easier or better way, let me know!
A more ambitious cgi page for your viewing pleasure. It uses the latest technology to see the future!
Coding like it's 1995, I added a toy cgi page: your ip address.
Have just discovered git-remote-gcrypt or "gcrypt" as I'll call it here. So far it's working well for me at solving this problem: you have something you want under source code control, you want to push it to a remote frequently for safety* but it contains secrets that shouldn't ever leave the host it's on.
If you have a PGP key pair, gcrypt resolves these conflicting objectives by encrypting the repository before pushing. The remote host only sees crypt text, no use to an attacker unless maybe it's the NSA. If your working copy is lost you can get it back provided you still have your ssh and pgp keys.
* There is a wise saying which from memory goes "if you've only saved it to one hard disk you haven't saved it." One of git's major benefits is saving to another hard disk is only a 'git push' away.
Thanks to the tilde contributors for providing tilde.club.