recentpopularlog in

ianweatherhogg : key   141

« earlier  
Keychain - Funtoo
acts as a frontend to ssh-agent and ssh-add, but allows you to easily have one long running ssh-agent process per system, rather than the norm of one ssh-agent per login session.
key  chain  gpg  agent  ssh 
5 weeks ago by ianweatherhogg
Paper storage and recovery of GPG keys
Paper storage and recovery of GPG keys
gpg  key  back  up 
6 weeks ago by ianweatherhogg
Build a Simple Persistent Key-Value Store in Elixir, using Logs - Part 1 - Elixir
In this series of articles we will see the different concepts behind a key-values store (Logs, Segments, Compaction, Memtable, SSTable) implementing a simple engine in Elixir, which is a great language to build highly-concurrent and fault-tolerant architectures.
elixir  key  value  data  base  reader  writer 
march 2019 by ianweatherhogg
Using Lets Encrypt to secure cloud-hosted services like Ubiquiti's mFi, Unifi and Unifi Video
Updated Jul 31, 2016: Moved away from letsencrypt-auto and switched to certbot, updated the auto-renewal script, and changed the suggested cron time to weekl...
ssl  certificate  java  key  tool  amazon  router 
june 2018 by ianweatherhogg
drduh/YubiKey-Guide: Guide to using YubiKey as a SmartCard for GPG and SSH
YubiKey-Guide - Guide to using YubiKey as a SmartCard for GPG and SSH
gpg  key  ssh  smart  card  5*  security 
february 2018 by ianweatherhogg
Establish your online identity using GnuPG
Creating and managing PGP keys is not a straightforward matter. Many approaches exist and if you are a whistleblower, this tutorial probably does not meet yo...
gpg  key  generator  manager  usb  5* 
july 2017 by ianweatherhogg
Akka-HTTP and SSL connections
For a rest-based project I wanted to create an akka-http server with SSL-support. Unfortunately I found only some scattered information, e.g. on Stackoverflo...
akka  http  ssl  certificate  java  key  store 
february 2017 by ianweatherhogg
igorbarinov/awesome-data-engineering: A curated list of data engineering tools for software developers
awesome-data-engineering - A curated list of data engineering tools for software developers
resource  data  engine  key  value  base 
june 2016 by ianweatherhogg
Marvel Developer Portal
The Marvel developer portal gives Marvel fans, partners and other technologists access to an array of powerful APIs, documentation, and other tools to interact with Marvel's systems.
api  mashup  key 
june 2016 by ianweatherhogg
The JWT auth provider - Vert.x
Vert.x is a tool-kit for building reactive applications on the JVM.
vertx  jwt  key  store 
april 2016 by ianweatherhogg
Link via an ambassador container
Using the Ambassador pattern to abstract (network) services
docker  network  bridge  key  value 
march 2016 by ianweatherhogg
API Introduction · Open Exchange Rates
Open Exchange Rates provides a simple, lightweight and portable JSON API with live and historical foreign exchange (forex) rates, via a simple and easy-to-integrate API, in JSON format. Data are tracked and blended algorithmically from multiple reliable sources, ensuring fair and unbiased consistency.
trading  data  api  mashup  key  json 
january 2016 by ianweatherhogg
OpenSSH Key Management, Part 3 : Agent Forwarding
In this third article in a series, Daniel Robbins shows you how to take advantage of OpenSSH agent connection forwarding to enhance security. He also shares recent improvements to the keychain shell script.
ssh  key  chain  linux  admin  gentoo 
december 2015 by ianweatherhogg
Creating Cel Animations With SVG – Smashing Magazine
Heydon Pickering streamlines the workflow for creating GIF-alike animations with SVG and demonstrates that automation can be a friend to creativity.
svg  animation  key  frame  sass  5* 
november 2015 by ianweatherhogg
How To Prototype UI Animations In Keynote – Smashing Magazine
UI designer need rapid, easy-to-learn, familiar tools to animate static designs. This article shows how to use Apple Keynote to achieve just that.
key  note  animation 
november 2015 by ianweatherhogg
The First Few Milliseconds of an HTTPS Connection
Convinced from spending hours reading rave reviews, Bob eagerly clicked “Proceed to Checkout” for his gallon of Tuscan Whole Milk and…
network  protocol  hex  binary  security  http  certificate  c  5*  key  encryption 
july 2015 by ianweatherhogg
Ethan's Tech Blog | A brief look into Scala
A random post about some parts of scala I found interesting
scala  sbt  plugin  helloworld  task  key  x  path  4* 
april 2015 by ianweatherhogg
- Gist is a simple way to share snippets of text and code with others.
gpg  key  base 
march 2015 by ianweatherhogg
How to backup, restore, delete, revoke your private and public GPG/PGK keys | Debian Ubuntu Linux Solutions Blog
This tutorial explains basic GPG/PGP key management in Debian. How to backup, restore, revoke, delete, etc.
gpg  security  key  import 
january 2015 by ianweatherhogg
How to set up stress-free SSL on an OS X development machine
How to set up stress-free SSL on an OS X development machine - Gist is a simple way to share snippets of text and code with others.
dns  tool  mac  http  ssl  certificate  test  environment  open  key  chain  node  4* 
december 2014 by ianweatherhogg
Authorizing a request | Twitter Developers
The purpose of this document is to show you how to modify HTTP requests for the purpose of sending authorized requests to the Twitter API.
All of Twitter’s APIs are based on the HTTP protocol. This means that any software you write which uses Twitter’s APIs sends a series of structured messages to Twitter’s servers. For example, a request to post the text “Hello Ladies + Gentlemen, a signed OAuth request!” as a Tweet will look something like this:
twitter  oauth  api  specification  http  authorization  head  url  encode  consumer  key  parameter  5* 
november 2014 by ianweatherhogg
Random Key Generator
A simple key generator for all your random needs.
random  number  key  generator  password 
november 2014 by ianweatherhogg
Nix Expression for Running Rails Apps - Gist is a simple way to share snippets of text and code with others.
key  base  gist 
november 2014 by ianweatherhogg
Tyblog | SSH Kung Fu
An extended look at SSH features that can serve a variety of purposes for different use cases.
ssh  proxy  share  connection  key  public  tunnel  file  mount  port  forward  alias  4* 
april 2014 by ianweatherhogg
Keychain - Funtoo
Keychain helps you to manage SSH and GPG keys in a convenient and secure manner. Download and learn how to use Keychain on your Linux, Unix or MacOS system.
key  chain  ssh  gpg  agent  configuration  4* 
march 2014 by ianweatherhogg
booting a self-signed Linux kernel - Linux Kernel Monkey Log
Now that The Linux Foundation is a member of the
group, I’ve been working on the procedures for how to boot a self-signed
Linux kernel …
linux  kernel  boot  bios  load  public  key  security 
january 2014 by ianweatherhogg
CoreOS is Linux for massive server deployments. Powered by docker, systemd, and etcd.
qemu  linux  host  ssh  key  generator  configuration 
january 2014 by ianweatherhogg
MetaFizzy Effect with Sass | CSS-Tricks
The following post is by Hugo Giraudel, a regular contributor here. In the grand CSS-Tricks tradition, Hugo found a cool effect on the web and dug into how
sass  key  frame  animation  css  tutorial 
january 2014 by ianweatherhogg
keyscss - A simple stylesheet for rendering beautiful keyboard-style elements.
github  css  keyboard  key 
january 2014 by ianweatherhogg
Introduction to Public-Key Cryptography | MDN
Public-key cryptography and related standards and techniques underlie security features of many Red Hat products, including signed and encrypted email, form signing, object signing, single sign-on, and the Secure Sockets Layer (SSL) protocol. This document introduces the basic concepts of public-key cryptography.
public  key  encryption  security  cryptography  certificate  helloworld  5* 
january 2014 by ianweatherhogg
« earlier      
per page:    204080120160

Copy this bookmark:

to read