In our in-house apps we went for the progressive-enhancement, almost-2 option.
When we're presenting data, one of our columns is nearly always a 'primary identifier' of some kind - a name, an id, etc. We make this column a hyper-link and then we also add a click handler to the row. This means it's still fully accessible to screen readers and tab navigators, but users who expect a more 'app'y experience are happy too.
The click handler has to be a little smart to ensure it's not receiving the mouse-up of a selection event, but it's not bad.
If you're interested in analogue electronics then you might like the analyses done on the ElectroSmash website. [1]
They reverse engineer schematics from guitar effects pedal PCBs like this Fuzz Face [2], then go through the process of breaking the circuit into blocks of operation. They also simulate the circuits such as with this Tube Screamer [3] and see what effect manipulating component values has on the signal.
Yup, I did the same. A contractor replaced all our Classic Macs with Windows 9x boxes and never taught any of the staff how to secure them.
We were using winpopup to send messages to each other, when I worked out how to send them to the entire subnet (or domain - I forget). Three months later I was hauled in front of the Deputy Rector to explain how I managed to 'write my name' on the admin office server. It turned out that they never turned on the monitor connected to the print server until the printer stopped working and they jumped to blaming me.
It took some really fast thinking to wriggle out of that one - I was warned 'he'd be watching me' from then on though.
The stories seem to be going backwards in time, so I'll chain my 80's version of this. I wrote a fake login prompt on our VAX that looked exactly like the normal login prompt on the VT100 terminals. It would record the userid and password in a log file, give the "wrong password" message, then exit/logout so the real prompt was there for their second try.
I'd launch that on a few terminals on my way out of the lab.
Never did anything notable with it, but didn't get caught either.
I believe this sort of thing is the primary reason for needing to ctl-alt-del to login to windows. Though I'll bet most people wouldn't think much of a (fake) login screen just being there ready to go...they'd probably try to login anyway.
Yeah, but not quite. When you sent the message it used your network I’d as for the ‘from’ field. I was even that dorky that the message I used to prove it worked was “Hello, World!”. Try explaining geek memes to high school teachers in the late 90’s.
https://github.com/samizdatco/skia-canvas/blob/master/packag...