Security Cryptography for laymen, part 2: encryption for data confidentiality One of the most common uses of cryptography, and arguably the practice that led to the creation of the modern field, is to conceal sensitive messages from prying eyes. This is known as encryption.
Security Cryptography for laymen, part 1: an introduction Even though we seem to live in a world where cryptography has a direct impact on our daily lives, there is considerable misunderstanding floating around.
Security The warranty that never pays out Anyone who has found themselves shopping around for "SSL certificates" will have wondered what criteria to use, besides price, to compare the products. Should the "warranty" be considered?
Configuration Laying the groundwork, part 3: Ghost I have always been amazed by the popularity of some technologies, in spite of their obvious flaws. But enough about why this blog isn't running on Wordpress, why did I choose Ghost?
Virtualisation Laying the groundwork, part 2: LXD I'm a strong believer in backtracking during the process of planning. While I've previously said that I had decided on using LXD to isolate the Ghost platform that powers this blog, this process was by no means linear.
Security Laying the groundwork, part 1: deciding what to do It'd be only suiting that the first articles deal with my experience setting up this blog. I'm very much a hands-on kind of person; others might prefer to call me a control freak.
About me Better late than never It's been just over 10 years since I first considered starting a blog. You see, I couldn't simply use a free or paid-for service – I had to at least set it up myself on a system I manage.