Author Archives: Peter

Encrypting text at the command line with GnuPG

Storing GnuPG content of any kind (that is, plain text to be encrypted, encrypted text to be decrypted, even public keys from co-respondents) on disk can result in the same kind of vulnerabilities associated with storing any sensitive data on … Continue reading

Posted in Command Line, GNU Privacy Guard, How-To, Open source applications, Open source software, Practical Cryptography, Secure computing, Security/Cryptography | Comments Off on Encrypting text at the command line with GnuPG

Talking to a computer

The most important tools in our society change not just the way we work but the way we talk and even think. If you’re not convinced, just consider all the different telephony-related phrases that have become an important part of … Continue reading

Posted in computer science, learning to program, Programmer's Tools | Comments Off on Talking to a computer

Managing shell command history in OS X/Linux

One of the many benefits of using the command line shell in OS X or Linux (or any *nix or similar OS) is that the operating system keeps a history of all the commands you use, storing them in a … Continue reading

Posted in Command Line, computer science, Editors, How-To, Linux Tech Talk, Open source software, Programmer's Tools, Secure computing, Security/Cryptography, Ubuntu Linux, Utilities | 1 Comment

Using diff

diff is a *nix command that takes two files and compares them, reporting on the differences between them. For example: $ diff foo.bar foo.bar $ When the files are identical, no output is generated (as in this case, comparing a … Continue reading

Posted in Command Line, computer science, How-To, Open source software, Practical Cryptography, Programmer's Tools, Secure computing, Security/Cryptography, Utilities | Comments Off on Using diff

GPG tutorials

Paul Heinlein’s GPG Quick Start (very basic, but useful) The GNU Privacy Handbook (more a how-to for gpg, plus concepts) GnuPG FAQ (some helpful things here, but pages more likely will be found via google) Using the GNU Privacy Guard … Continue reading

Posted in Practical Cryptography, Secure computing, Security/Cryptography | Comments Off on GPG tutorials

Cloud Data Security Using Cloud Storage

Data stored on a cloud storage provider service is generally well-protected from routine eavesdroppers or man-in-the-middle attacks, but there remain other threats. Consider Dropbox, just one of many new services provided online for storing data in the cloud. Dropbox is … Continue reading

Posted in Uncategorized | Comments Off on Cloud Data Security Using Cloud Storage

Fundamentals of Cryptography

There are tens of millions of pages of content on the web that address encryption or cryptography; that means two things: first, there is no shortage of good content explaining what encryption and cryptography are; second, there is also no … Continue reading

Posted in Uncategorized | Comments Off on Fundamentals of Cryptography

HTTPS Everywhere

HTTPS stands for “Hypertext Transfer Protocol Secure”. The protocol itself is the same as HTTP, but when a web resource is accessed via an HTTPS link the web client and web server negotiate a layer of encryption, with the goal … Continue reading

Posted in Uncategorized | Comments Off on HTTPS Everywhere

Bellovin on passwords

Steven Bellovin is now Chief Technologist of the Federal Trade Commission, and he opened his tenure with an excellent blog entry about passwords: Password Compromises, a follow up to one of former Chief Technologist Ed Felton’s last blog posts in … Continue reading

Posted in Uncategorized | Comments Off on Bellovin on passwords

This is how I learn

So, it’s Thursday morning and I’m ready to start work, and I remember that I wanted to start logging my diet. Just write down a note to myself, every time I eat something: what did I eat? how much? when? … Continue reading

Posted in Uncategorized | Comments Off on This is how I learn