Tag: software

  1. Setting up Syncthing.

    08 February 2023

    A very common problem one has if one has enough files stacked up in one place, is whether or not those files have been copied to another system already. Have they already been copied off? To where on the other system were they copied? Sure, you can deduplicate them through various means but that tends to be kind of a sledgehammer thing to do, especially when one of the things with files is a mobile device. You could always upload the files to a provider's cloud1 storage, like Google Drive or iCloud or something.

    But what if you don't …

    Read more...

  2. What's on my desk?

    03 February 2022

    In the last couple of weeks, a meme has been going around the blogging community where people talk about the stuff they use on an everyday basis. So, I figured, why not. I write about everything else, right?

    Hardware-wise you're probably already familiar with Windbringer's specs because I document all of my laptops. It's also no surprise that I run Arch Linux everywhere I can get away with it. Not a whole lot has changed on that front. I'm running the MATE Desktop Environment as my daily user interface, I'm trying to get used to neoVIM as my go-to text …

    Read more...

  3. Neologism: Software installation roulette

    08 May 2020

    software installation roulette - The practice of piping the output of a web browser or other HTTP tool directly through a system shell, usually as root to install something important.  The danger is that you don't know if the shell script has anything nefarious in it (such as rm -rf / or the installation of a rootkit) and by the time you find out it's far too late.

    For example: sudo bash -c "$(wget -q -O- https://totally.legit.example.com/install.sh)"

    Read more...

  4. Have you tried turning it off and back on again?

    03 June 2019

    Disclaimer: The content of this post does not reflect my current employer, or any of my clients at present.  I've pulled details from my work history dating back about 20 years and stitched them into a more-or-less coherent narrative without being specific about any one company or client because, as unfashionable as it may be, I take my NDAs seriously.  If you want to get into an IT genitalia measuring contest please close this tab, I don't care and have no interest.

    Time was, back in the days of the home 8-bit computers, we were very limited in what we …

    Read more...

  5. If Microsoft buys Github, there are alternatives.

    04 June 2018

    If you're plugged into the open source or business communities to any degree, you've probably heard buzz that Microsoft is considering buying Github, an online service with a history of having a toxic work environment due to pervasive sexual harassment but still remains the de facto core of collaboration of the open source community - source code hosting, ticket tracking, archival, release management, documentation, project webpage hosting, and generally learning how to use the Git version control system.  At this point it's unclear if they're considering merely investing in the company (currently valued in the neighborhood of $5bus) or buying it …

    Read more...

  6. Generating passwords.

    22 May 2018

    A fact of life in the twenty-first century are data breaches - some site or other gets pwned and tends to hundreds of gigabytes of data get stolen.  If you're lucky just the usernames and passwords for the service have been taken; if you're not, credit card and banking information has been exfiltrated.  Good times.

    You've probably wondered why stolen passwords are dangerous.  There are a few reasons for this: The first is that people tend to re-use passwords on multiple sites or services.  Coupled with the fact that many online services use e-mail addresses as usernames, this means that all …

    Read more...

1 / 6