-
Recent Posts
Categories
Archives
- July 2023
- April 2023
- March 2023
- February 2023
- January 2023
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- April 2020
- February 2020
- January 2020
- December 2019
- November 2019
- October 2019
- September 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019
- December 2018
- November 2018
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
Meta
Tags
- arduino
- aws
- best practices
- boot
- booting from grub
- c / c+
- cloud computing
- DIY
- docker
- dos
- encryption
- FOP
- grub
- hardware
- howto
- humor
- java
- linux
- load testing
- medicine
- oldschool
- online shopping
- open source
- paranoid
- pcbuilding
- performance testing
- political activism
- politicians
- programming
- review
- scripting
- security
- soapbox
- strangelaws
- surveillance
- tinfoil hat
- UK
- vaccine
- virtual computing
- virus
- web services
- websphere
- windows
- wordpress
- XSL-FO
Monthly Archives: June 2017
safe computing – weak case for weakening encryption
You cannot strengthen the weak by weakening the strong. William J. H. Boetcker This quote has been often misattributed to Abraham Lincoln. This is actually a very relevant thought with the respect to economics. Indeed you cannot improve everybody’s lot … Continue reading
Posted in Soapbox
Tagged encryption, surveillance, tinfoil hat
Comments Off on safe computing – weak case for weakening encryption
just making it – revisiting my cube
Some time back, I had a fair amount lot of free time. I spent the time working with a friend Mikhail in the evenings to create my own LED cube from scratch. It was actually quite a bit of fun, the … Continue reading
Posted in programming
Comments Off on just making it – revisiting my cube
interrogating your code – dipping your toes into java’s reflection
Perhaps the coolest programming language ability that I was never allowed to use was reflection in Java. Why? Well, thats another story. What exactly is reflection? Well, reflection is a set of low level methods that can be used to … Continue reading
Posted in programming
Tagged java
Comments Off on interrogating your code – dipping your toes into java’s reflection
Security in homogeneous systems
The Central Intelligence Agency (CIA) has been quite industrious in creating a new way[1] of tracking documents that could be “borrowed” from a person, business or government against the will of of that entity. This new document protection is the … Continue reading
Posted in security
Tagged best practices, open source, paranoid
Comments Off on Security in homogeneous systems