For excessively paranoid client authentication.
Organization & Common Name: Some human identifier for this server CA.
openssl genrsa -des3 -out ca.key 4096
openssl req -new -x509 -days 365 -key ca.key -out ca.crt
For excessively paranoid client authentication.
Organization & Common Name: Some human identifier for this server CA.
openssl genrsa -des3 -out ca.key 4096
openssl req -new -x509 -days 365 -key ca.key -out ca.crt
#!/bin/bash | |
for arg; do [[ $arg = /* ]] || arg=$PWD/$arg; absargs+=("$arg"); done; | |
/Applications/p4merge.app/Contents/Resources/launchp4merge "${absargs[@]}" | |
# coding=UTF-8 | |
from __future__ import division | |
import re | |
# This is a naive text summarization algorithm | |
# Created by Shlomi Babluki | |
# April, 2013 | |
class SummaryTool(object): |
module Kernel | |
alias :old_req :require | |
def require(*args) | |
puts "Require called with: #{args}" | |
old_req *args | |
end | |
end | |
require 'pp' |
773 ɪ | |
750 ə | |
547 n | |
489 t | |
480 ː | |
393 d | |
334 s | |
327 a | |
304 l | |
296 e |
#!/usr/bin/env ruby | |
# | |
# Name: reval.rb | |
# License: MIT | |
# Author: postmodern (postmodern.mod3 at gmail.com) | |
# Description: | |
# | |
# Re-evaluates a specified Ruby file whenever the file changes. | |
# Reval was inspired by Giles Bowkett's kickass talk on Archaeopteryx at | |
# RubyFringe 2008, where Giles used some mad Ruby to re-evaluate his |
#!/usr/bin/env bash | |
# Loads and mounts an ISO over SMB via the | |
# SuperMicro IPMI web interface | |
# | |
# usage: supermicro-mount-iso.sh <ipmi-host> <smb-host> <path> | |
# e.g.: supermicro-mount-iso.sh 10.0.0.1 10.0.0.2 '\foo\bar\windows.iso' | |
set -x |
Journalism can be a high-risk activity, and some stories are a lot riskier than others. In a part one we covered the digital security precautions that every journalist should take. If one of your colleagues uses weak passwords or clicks on a phishing link, more sophisticated efforts are wasted. But assuming that everyone you are working with is already up to speed on basic computer security practice, there's a lot more you can do to provide security for a specific, sensitive story.
This work begins with thinking through what it is you have to protect, and from whom. This is called threat modeling and is the first step in any security analysis. The goal is to construct a picture -- in some ways no more than an educated guess -- of what you're up against. There are many ways to do this, but this post is structured around four basic questions.
NOTE: sounds decent for desktops/laptops, but servers gain no benefit (and are presumed to be out of scope) - jwilkins | |
> - floating ADC inputs, as Peter suggested; | |
> - five independent RC oscillators. | |
I've got another idea that requires no extra hardware. I think has a | |
solid theoretical basis which I've explored below in sufficient detail | |
to raise suspicions that I miss my old line of work: | |
tl;dr: Record the dt time between button clicks, adding dt to the |