One of the inconviences of encryption is the need to open the encrypted volume by hand when the computer/server boots. Luckily, you can easily automate that. You need a machine that will act as a key server.
By halfgaar, 2 days ago, on May 22, 2016, at 20:05 |
I had a server that booted with a degraded array every time, because there was a USB drive attached to it, that messed up the auto detection. I solved it by putting this in mdadm.conf:
By halfgaar, 4 weeks ago, on April 27, 2016, at 09:04 |
While trying to find out the quickest, cleanest way to install PDFedit program in Linux Mint, I stumbled upon Master PDF Editor for Linux, which is basically the same thing, but more advanced and closed source, but free for personal use.
By Rowan Rodrik, 10 months ago, on July 13, 2015, at 19:07 |
Now, what will follow is the first published note about BigSmoke's Unified Linking Language (BULL), posted here not for you but for me, because my notes are such a terrible mess, covering too many pieces of papers and disjointed files.
By Rowan Rodrik, 1 year ago, on April 13, 2015, at 18:04 |
During most of my bachelor, I've used paper and pen or pencil to take notes. Halfway my second minor [Okasys], though, I switched to my laptop and LaTeX, which I preferred, because typing is faster than writing and reworking my notes into a halfway decent summary usually proved too time-consuming with hand-written notes. Admittedly, though, although reorganizing my notes became easier with LaTeX, I still didn't really get to the finished summary stage, because I'm still way too obsessive-compulsive about the whole thing, most of the time. Now, since I figured I use my blog for all sorts of notes, I can just as well let WordPress and Google do some of the organizing for me, while taking notes for my present course. I just have to be a bit more careful about copyright issues (but, if the need strikes, I can always set a post to private).
By Rowan Rodrik, 1 year ago, on March 19, 2015, at 14:03 |
One day, some day long ago, I said to Jeroen Dekker, a photographer friend of mine, who was still learning to program at the time: “Programming is talking to the future.” He thought it was a good quote. Coming across it again now, so do I. It's good because it's true, which everybody who has ever debugged some old code—be it their own or someone else's—can attest to.
By Rowan Rodrik, 1 year ago, on March 16, 2015, at 21:03 |
By Rowan Rodrik, 1 year ago, on March 16, 2015, at 16:03 |
Another article link from my dusted-over ~jot directory: The Insecurity of Security Questions: Why I met my wife in CWmKryWzuxCSAnMDuIg. [So dusted-over is my ~/jot directory that Tom Moertel, the article's author, has changed he link schema of his blog without providing redirects. (The slashes in the date turned to dashed.) Cool URLs don't change, Tom, not according to the
By Rowan Rodrik, 1 year ago, on March 14, 2015, at 17:03 |
In August 2011, probably while procrastinating learning for my university admission exams, with one mouldy foot still in my IT-past, I signed up for Security Override, an online game designed to turn network security n00bs such as myself into novices.
By Rowan Rodrik, 1 year ago, on March 14, 2015, at 16:03 |
This link to The Architecture of Open Source Applications book was gathering dust somewhere in my ~/jot directory. In true free software spirit, it is released under a Creative Commons licence and the individual chapters are readable online. Each chapter about the architecture of a particular open source software project is written by the (co-)author of that respective project.
By Rowan Rodrik, 1 year ago, on March 14, 2015, at 15:03 |