Last week I wrote about my issue with Emacs’ visible-bell on OS X El Capitan. I figured it was about the most esoteric thing I’ve written, but it may have gotten more comments then any other post. I’m not sure if that’s good or bad…
In any case, before coming up with my work-around, I first tried rebuilding Emacs, in case the issues had been already fixed or simply re-compiling/re-linking would take care of it. That didn’t help, but this is fine time to revisit building Emacs from source on OS X.
After I upgraded to OS X El Capitan, I started having random display issues with my build from source version of Emacs. After a while I realized that it was caused by the visual bell. I hate terminals/widows beeping at me, so I always set:
.emacs. However, under El Capitan this smears (for lack of a
better word) the center of the window with bits of zoomed in text.
Once you have a CA configured, you need to setup the Apache Web server to use it. The process of requesting the certificate from the browser and verifying that it’s properly signed is handled by Apache, which can then pass information about the verification to your application.
Previously, I wrote about the promise of using Client SSL Certificates for authentication. With this post, we start down the road of actually putting this in practice.
The first step is to set up a Certificate Authority (CA).
Ever had to change the URL in 50 files? What do you do?
(You should know by now I’d use Emacs.)
Or whip up a Bash script with
Since dinosaurs roamed the Earth, I’ve been using Perl’s In Place
Let’s break it down, shall we?
Holy crap! You can use SSL client certificates to easily authenticate user logins!
What they hell am I talking about?
So, there’s this thing, SSL client certificates. They are pretty much exactly the same as SSL server certificates. They work like this:
- The web server has a key pair.
- The client generates a key pair.
- The client send the public key to the server.
- The server signs the public key with it’s private key and send a certificate back to the client.
- The client saves the certificate.
What’s that good for? Authentication! How’s it work?
Sometime I want all of Rails’ form bells and whistles for something that isn’t a database backed model. For example, I use this as a handy way to get form validations when starting a session with an API.
This is possible because Rails allows you to use ActiveModel without a database.
The diceware passwords of reasonable length are strong, they have high entropy. However, most password security requirements aren’t based on entropy, but instead are made up, with people throwing in requirements for capital letters, numbers, and symbols because they sound good.
Well, we don’t get to set policy, so I’ve modified my script to generate passwords with numbers and symbols as separators.
This is one of the blog posts to set something in my mind that I’m
always looking up. Linux has lovely tools for adding and managing
users, but I can never remember them. I’m old skool and BSD-centric,
so I tend to just use
vipw, but it’s better to use the tools. So,
with no further ado:
Every wondered what the timestamps on files on UNIX sytems mean?
Unix keeps three or four timestamps per file (or directory (or other random thing in the file system).