Quantcast
Channel: Loshin.com » Peter
Browsing latest articles
Browse All 13 View Live

This is how I learn

So, it’s Thursday morning and I’m ready to start work, and I remember that I wanted to start logging my diet. Just write down a note to myself, every time I eat something: what did I eat? how much?...

View Article



Bellovin on passwords

Steven Bellovin is now Chief Technologist of the Federal Trade Commission, and he opened his tenure with an excellent blog entry about passwords: Password Compromises, a follow up to one of former...

View Article

HTTPS Everywhere

HTTPS stands for “Hypertext Transfer Protocol Secure”. The protocol itself is the same as HTTP, but when a web resource is accessed via an HTTPS link the web client and web server negotiate a layer of...

View Article

Image may be NSFW.
Clik here to view.

Fundamentals of Cryptography

There are tens of millions of pages of content on the web that address encryption or cryptography; that means two things: first, there is no shortage of good content explaining what encryption and...

View Article

Cloud Data Security Using Cloud Storage

Data stored on a cloud storage provider service is generally well-protected from routine eavesdroppers or man-in-the-middle attacks, but there remain other threats. Consider Dropbox, just one of many...

View Article


GPG tutorials

Paul Heinlein’s GPG Quick Start (very basic, but useful) The GNU Privacy Handbook (more a how-to for gpg, plus concepts) GnuPG FAQ (some helpful things here, but pages more likely will be found via...

View Article

Using diff

diff is a *nix command that takes two files and compares them, reporting on the differences between them. For example: $ diff foo.bar foo.bar $ When the files are identical, no output is generated (as...

View Article

Managing shell command history in OS X/Linux

One of the many benefits of using the command line shell in OS X or Linux (or any *nix or similar OS) is that the operating system keeps a history of all the commands you use, storing them in a dot...

View Article


Talking to a computer

The most important tools in our society change not just the way we work but the way we talk and even think. If you’re not convinced, just consider all the different telephony-related phrases that have...

View Article


Encrypting text at the command line with GnuPG

Storing GnuPG content of any kind (that is, plain text to be encrypted, encrypted text to be decrypted, even public keys from co-respondents) on disk can result in the same kind of vulnerabilities...

View Article
Browsing latest articles
Browse All 13 View Live




Latest Images