For excessively paranoid client authentication.
Updated Apr 5 2019:
because this is a gist from 2011 that people stumble into and maybe you should AES instead of 3DES in the year of our lord 2019.
some other notes:
I spent a lot of time trying to find a pretty optimal (for me) setup for Clojure… at the same time I was trying to dive in and learn it. This is never optimal; you shouldn't be fighting the environment while trying to learn something.
I feel like I went through a lot of pain searching Google, StackOverflow, blogs, and other sites for random tidbits of information and instructions.
This is a comprehensive "what I learned and what I ended up doing" that will hopefully be of use to others and act as a journal for myself if I ever have to do it again. I want to be very step-by-step and explain what's happening (and why) at each step.
This gist contains the nginx and tor configurations for the [mike.tig.as][mta] servers, mainly to show:
chris-lea/nginx-devel
PPA to allow use of SPDY.ssl_ciphers
selection to mitigate BEAST attack, enable
[perfect forward secrecy][pfs] if possible and select the strongest
possible ciphers within those bounds. (Exception is made for several
ciphers at the end of list, for compatibility reasons.)[ | |
{ | |
"caption": "SublimeREPL: SML", | |
"command": "run_existing_window_command", "args": | |
{ | |
"id": "repl_sml", | |
"file": "config/SML/Main.sublime-menu" | |
} | |
} | |
] |
This article is now published on my website: A one-off git repo server.
require 'rubygems' | |
require 'serialport' | |
class Korad | |
def initialize(port="/dev/ttyACM0", baud=9600) | |
@serial = SerialPort::open(port,baud) | |
@serial.read_timeout = 100 | |
end | |
def get_status |
from __future__ import print_function | |
from collections import OrderedDict | |
from prepareable import Prepareable | |
from six import with_metaclass, iteritems | |
class FooMeta(with_metaclass(Prepareable, type)): | |
def __new__(cls, name, bases, attributes): |
package main | |
import( | |
"log" | |
"net/url" | |
"net/http" | |
"net/http/httputil" | |
) | |
func main() { |
# to generate your dhparam.pem file, run in the terminal | |
openssl dhparam -out /etc/nginx/ssl/dhparam.pem 2048 |
lsusb
lists the fingerprint reader in the x240 as follows:
Bus 002 Device 003: ID 138a:0017 Validity Sensors, Inc.
There exists experimental driver support for this in a fork of libfprint for vfs5011 sensors, however you'll need to compile the driver yourself. To get the fingerprint sensor to work for lightdm login, su etc, follow these steps.
Install fingerprint-gui:
sudo add-apt-repository ppa:fingerprint/fingerprint-gui