Security Cryptography for laymen, part 2: encryption for data confidentiality One of the most common uses of cryptography, and arguably the practice that led to the creation of the modern field, is to conceal sensitive messages from prying eyes. This is known as encryption.
Security Cryptography for laymen, part 1: an introduction Even though we seem to live in a world where cryptography has a direct impact on our daily lives, there is considerable misunderstanding floating around.
Security The warranty that never pays out Anyone who has found themselves shopping around for "SSL certificates" will have wondered what criteria to use, besides price, to compare the products. Should the "warranty" be considered?
Virtualisation Laying the groundwork, part 2: LXD I'm a strong believer in backtracking during the process of planning. While I've previously said that I had decided on using LXD to isolate the Ghost platform that powers this blog, this process was by no means linear.
Security Laying the groundwork, part 1: deciding what to do It'd be only suiting that the first articles deal with my experience setting up this blog. I'm very much a hands-on kind of person; others might prefer to call me a control freak.