Quantcast
Channel: protodave
Browsing latest articles
Browse All 8 View Live

Image may be NSFW.
Clik here to view.

Manually triggering Google Apps account transition

If you want to be an early adopter, and haven’t already automatically been given the option to transition your Google Apps account to the new infrastructure, here’s a handy tip to manually trigger the...

View Article


Image may be NSFW.
Clik here to view.

Repair the cycle: Design for Disassembly

Some good news! The pendulum of product design philosophy (and the design of the production process itself) is continuing to swing away from disposable objects with built-in obsolescence and is finally...

View Article


Image may be NSFW.
Clik here to view.

Counting your top WordPress comment spam source IPs and URLs

Photo Credit: Flickr/Jerry Pank I launched a new WordPress blog for a client a few months ago and have been watching as comment spammers find the site and do what they do best, leave spam. As the first...

View Article

Image may be NSFW.
Clik here to view.

Checking your DKIM DNS record

Update Nov 2012: Due to the recently released vulnerability related to the use of weak cryptographic DKIM keys, I wrote a tool to check DKIM records and determine their public key length: DKIM Key...

View Article

Javascript Word Wrapping

I recently needed to do some manual word wrapping (and possibly hyphenation) of strings in JavaScript and found some interesting code projects: TypeSet – an implementation of the Knuth and Plass line...

View Article


Eclipse, EGit, github, jsch and AES-128 encrypted private keys

Here’s a tip if you are having trouble connecting to github using Eclipse/Egit with a recently generated SSH key pair… The Issue I had created a new SSH key pair to access a client project codebase in...

View Article

Image may be NSFW.
Clik here to view.

Github SSH Public Key Fingerprint Checking

A security vulnerability was discovered at GitHub this week that made it possible for an attacker to add new SSH keys to arbitrary GitHub user accounts. Although there was no known malicious activity...

View Article

Verifying a DKIM TXT Record and Key Length

After reading the Wired story last week about Zachary Harris discovering a widespread vulnerability related to the use of weak cryptographic DKIM keys (less than 1024 bits) by companies like Google,...

View Article

Browsing latest articles
Browse All 8 View Live