This is how I learn
So, it’s Thursday morning and I’m ready to start work, and I remember that I wanted to start logging my diet. Just write down a note to myself, every time I eat something: what did I eat? how much?...
View ArticleBellovin on passwords
Steven Bellovin is now Chief Technologist of the Federal Trade Commission, and he opened his tenure with an excellent blog entry about passwords: Password Compromises, a follow up to one of former...
View ArticleHTTPS Everywhere
HTTPS stands for “Hypertext Transfer Protocol Secure”. The protocol itself is the same as HTTP, but when a web resource is accessed via an HTTPS link the web client and web server negotiate a layer of...
View ArticleFundamentals of Cryptography
There are tens of millions of pages of content on the web that address encryption or cryptography; that means two things: first, there is no shortage of good content explaining what encryption and...
View ArticleCloud Data Security Using Cloud Storage
Data stored on a cloud storage provider service is generally well-protected from routine eavesdroppers or man-in-the-middle attacks, but there remain other threats. Consider Dropbox, just one of many...
View ArticleGPG tutorials
Paul Heinlein’s GPG Quick Start (very basic, but useful) The GNU Privacy Handbook (more a how-to for gpg, plus concepts) GnuPG FAQ (some helpful things here, but pages more likely will be found via...
View ArticleUsing diff
diff is a *nix command that takes two files and compares them, reporting on the differences between them. For example: $ diff foo.bar foo.bar $ When the files are identical, no output is generated (as...
View ArticleManaging shell command history in OS X/Linux
One of the many benefits of using the command line shell in OS X or Linux (or any *nix or similar OS) is that the operating system keeps a history of all the commands you use, storing them in a dot...
View ArticleTalking to a computer
The most important tools in our society change not just the way we work but the way we talk and even think. If you’re not convinced, just consider all the different telephony-related phrases that have...
View ArticleEncrypting text at the command line with GnuPG
Storing GnuPG content of any kind (that is, plain text to be encrypted, encrypted text to be decrypted, even public keys from co-respondents) on disk can result in the same kind of vulnerabilities...
View Article