Simple Steps to Data Encryption: ORDER NOW!
Practical Anonymity: PRE ORDER NOW!
-
Recent Posts
Recent Comments
Archives
- October 2013
- July 2013
- February 2013
- November 2012
- October 2012
- September 2012
- August 2012
- November 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2008
- July 2008
- June 2008
- May 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
- September 2007
- August 2007
- July 2007
Categories
- "Get the Facts" ™
- Astronomy
- Backup
- Bicycles
- Books
- Business Intelligence
- Business Practices
- Command Line
- Compiz
- computer science
- Cooking with Kids
- Copyrights and Copywrongs
- Django
- Editors
- Education
- Emacs
- Family Stuff
- Firefox
- Free/Open Source Projects to Watch
- Fun Things to Do
- Futurama
- Games
- git
- GNU Privacy Guard
- Good blogs to follow
- Hardware
- Health and fitness
- Healthy Diet
- Household Chores
- How-To
- How-to Websites
- IBM Linux Articles
- interesting applications
- Interesting Stuff
- Learning
- Learning Programming
- learning to program
- Linux Distros
- Linux Hardware
- Linux News
- Linux Tech Talk
- list application design
- list applications
- list databases
- Listacular
- Lists
- Mathematics
- Meta
- Microsoft Watch
- Microsoft Windows
- Multimedia
- Music
- MySQL
- Mystery Science Theater 3000
- Nature
- Office Productivity
- Open Sauce
- Open source and politics
- Open source applications
- Open Source Education
- Open source enterprise software
- Open Source News
- Open Source Paradigm
- Open source software
- Open Standards
- Our World
- Papercraft
- Performance Tuning
- PHP
- Practical Cryptography
- Programmer's Tools
- Python
- Reading
- School stuff
- Science Fiction
- Secure computing
- Security/Cryptography
- Software Licensing
- Stories
- Switching to Linux
- Ubuntu Linux
- Uncategorized
- Upgrades
- Utilities
- Virtualization
- web list applications
- Web/Tech
- Windows "Wins"
- WordPress
Meta
Monthly Archives: November 2012
Using diff
diff is a *nix command that takes two files and compares them, reporting on the differences between them. For example: $ diff foo.bar foo.bar $ When the files are identical, no output is generated (as in this case, comparing a … Continue reading
Posted in Command Line, computer science, How-To, Open source software, Practical Cryptography, Programmer's Tools, Secure computing, Security/Cryptography, Utilities
Comments Off on Using diff
GPG tutorials
Paul Heinlein’s GPG Quick Start (very basic, but useful) The GNU Privacy Handbook (more a how-to for gpg, plus concepts) GnuPG FAQ (some helpful things here, but pages more likely will be found via google) Using the GNU Privacy Guard … Continue reading
Posted in Practical Cryptography, Secure computing, Security/Cryptography
Comments Off on GPG tutorials
Cloud Data Security Using Cloud Storage
Data stored on a cloud storage provider service is generally well-protected from routine eavesdroppers or man-in-the-middle attacks, but there remain other threats. Consider Dropbox, just one of many new services provided online for storing data in the cloud. Dropbox is … Continue reading
Posted in Uncategorized
Comments Off on Cloud Data Security Using Cloud Storage