-
Recent Posts
Categories
Archives
- July 2023
- April 2023
- March 2023
- February 2023
- January 2023
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- April 2020
- February 2020
- January 2020
- December 2019
- November 2019
- October 2019
- September 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019
- December 2018
- November 2018
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
Meta
Tags
- arduino
- aws
- best practices
- boot
- booting from grub
- c / c+
- cloud computing
- DIY
- docker
- dos
- encryption
- FOP
- grub
- hardware
- howto
- humor
- java
- linux
- load testing
- medicine
- oldschool
- online shopping
- open source
- paranoid
- pcbuilding
- performance testing
- political activism
- politicians
- programming
- review
- scripting
- security
- soapbox
- strangelaws
- surveillance
- tinfoil hat
- UK
- vaccine
- virtual computing
- virus
- web services
- websphere
- windows
- wordpress
- XSL-FO
Tag Archives: best practices
Hacking skills as determined by a politician
Words have meaning and it is a bit disturbing when you read an article or see a speech where they are being incorrectly used. The most recent example of this is how people use or refer to technology. When computers … Continue reading
Posted in programming, security
Tagged best practices
Comments Off on Hacking skills as determined by a politician
Chasing the little green lock
I wanted for the longest time to both convert this blog from http to https. Computers are ever more powerful and my site is pretty simple – it should not have been a big deal. Not only that but with the … Continue reading
Posted in programming, security
Tagged best practices, linux, wordpress
Comments Off on Chasing the little green lock
command line fun – finding security problems with find
I cannot actually remember how it happened. I wasn’t paying enough attention and was viewing one of my scripts on production. When I was finished I did what I always do in vi – I exited the script using : … Continue reading
Posted in Command line
Tagged best practices, howto, scripting, security
Comments Off on command line fun – finding security problems with find
Maven simple example
Maven was briefly described in my previous post. In this post I will do a few small examples for actually using Maven. One of the main things about Maven is the idea of the artifact. The artifact is a file, which … Continue reading
Maven the alternative build tool
Why maven Maven is a tool for building software. Doesn’t there already exist a number of tools for doing this exact task? Two different tools that do this are the classic make utility or the much newer Apache Ant. The make utility … Continue reading
enhancing the privacy we still have
Is privacy is simply too much work? The problem is not that technology cannot help out but in my case it seems that I am constantly installing or setting up new computers or virtual machines and there is never the … Continue reading
Posted in security
Tagged best practices, paranoid
Comments Off on enhancing the privacy we still have
Security in homogeneous systems
The Central Intelligence Agency (CIA) has been quite industrious in creating a new way[1] of tracking documents that could be “borrowed” from a person, business or government against the will of of that entity. This new document protection is the … Continue reading
Posted in security
Tagged best practices, open source, paranoid
Comments Off on Security in homogeneous systems
Is Agile development the Emperors new clothes
I had the opportunity to take a class on Agile development recently, Scrum, and it was a fascinating way of doing development. I have been pretty lucky over my career that I have not been dragged through a lot of … Continue reading
Posted in Soapbox
Tagged best practices
Comments Off on Is Agile development the Emperors new clothes
Machine generation of PDF files the easy way – final piece
This is essentially a refinement of the previous steps. I have added a lot of new list data but instead of being limited to what political party they are in or even if they like to party, I have extended … Continue reading
Posted in programming
Tagged best practices, FOP, open source, XSL-FO
Comments Off on Machine generation of PDF files the easy way – final piece
Machine generation of PDF files the easy way – part VI
The entire example report up until this point has been nice with a cool feature or two but terribly unrealistic. It is important to have the data in mind when creating the form but the form that I have created … Continue reading
Posted in programming
Tagged best practices, FOP, open source, XSL-FO
Comments Off on Machine generation of PDF files the easy way – part VI