Using public networks for sensitive online communication is inherently risky. Anything that is not transferred through a secured connection is publicly visible. After snooping network traffic at various public wifi hotspots (for academic purposes) I have become a more paranoid web surfer. The https and padlock just aren’t good enough for me anymore. So, whenver…
Category: Guides
How To’s and other guides.
How To: SSH Public Key Authentication
This is a mini guide on setting up public/private key authentication for SSH. There are several benefits for doing this. For example, it can be used to automate authentication, or to enhance security by requiring a pre-generated key in addition to a normal password.
Inside a Western Digital MyBook
Ever wanted to see the inside of a Western Digital MyBook? I have. One of my 500GB Western Digital MyBook’s died, three months out of warrant … how convenient. Instead of trashing it, I decided to take it apart and see what kind of hardware was used.
How I use Pingdom’s HTTP Custom Feature
One of the biggest annoyances to me when doing research on the internet is when I find an enticing summary from a search engine query, but, when I try to access the resource, the website is not accessible because [the database server was down | enter your reason here]. This is why for the year…