What an interesting math plotting site. Amusing
pvbrowser: HMI and Scada for everyone
See pvbrowser – The Process Visualization Browser. HMI and Scada for every platform.: there are free-as-in-freedom projects to handle industrial automation!
Reveal.js Theme for WordPress
Many speakers use the Reveal.js HTML presentation framework to display slides due to its simplicity and compatibility with mobile devices. It was created by Swedesh developer Hakim El Hattab, who a…
Sorgente: Create a Website for Your Presentation Slides with the Reveal.js Theme for WordPress
How would you compare these editors? What are the pros and cons of each? [note] This is not meant to be answered by those who “hate one and love another” or those who haven’t used both.
Sorgente: What are the pros and cons of Vim and Emacs?
That’s so funny!
A Song Of Regret – YouTube
Song of regret
(Peter Sinfield – Angelo Branduardi)Winter’s frozen moments
Will melt once more to spring,
Birds with peppered feathers
Return once more to sing…
But so high soars the mountain
That though I climb and climb
She always hides her flowers from me…In long ago’s lost garden
The apple trees will bear
A thousand fruits of red and green
But not one will I share…
For constant must I travel
And in some far off land
Lie down once more remembering…
<
p class=”text6″>Every time I meet this wonderful song by Angelo Branduardi I cannot help but stopping everything I’m doing and stand still listening to it.
Moving a GPG Key (Privately) | Short-Circuit Synapse
Sometimes I have to move my GnuPG key between computers for some reason, and although GnuPG does have features to export your private key, they are not as well documented, probably out of choice to discourage their use, as they can be a security issue. I have developed the following method to export both the public and private keys together, so that they can be easily imported, and with the minimum of secret data written to disk.
- Find out the keyid of the key you wish to export. You can get this from the output of
gpg -K
- First, export the public key. This is of course public info, so no worries about security here
gpg --output pubkey.gpg --export {KEYID}
- Now, in one fluid step, we will export the secret key, combine it into one file with the public key, and then encrypt it for transfer
gpg --output - --export-secret-key {KEYID} |\ cat pubkey.gpg - |\ gpg --armor --output keys.asc --symmetric --cipher-algo AES256
You will be prompted for a passphrase during this, this is the passphrase just for this temporary encryption for transfer. So use a good passphrase for security, and remember that passphrase!
- Now, transfer the keys.asc file to the new computer or wherever. Because it’s encrypted you could technically do this over the internet and it should still be secure, but I would suggest not using the internet for added security. When I last did this I just used a normal flash drive.
- On the new computer, we need to import the keys from the file. So, run this command to unpack and then import the keys (using pipes again)
gpg --no-use-agent --output - keys.asc | gpg --import
- And that, should be, that.
Sorgente: Moving a GPG Key (Privately) | Short-Circuit Synapse
Save WiFi – LibrePlanet
https://libreplanet.org/wiki/Save_WiFi
According to this page Fcc of US of America are trying to cryptographically lock down each and every consumer radio device, including WiFi Bluetooth and the like.
It is clearly a really bad new and I’m wondering whenever I could possibly act in any effective way, not being a citizen of US of America.
Gnome-Pie
Homepage of Gnome-Pie, the slick application launcher for Linux.
Sorgente: Gnome-Pie – Simon Schneegans
This looks really slick. The idea of circular menus have been – ehrm – circulating for quite a while.
While I like it I think it would benefit more desktops like Mate or XFCE.
the Retrogames Machine
the Retrogames Machine ovvero come farmi perdere nei ricordi…..
Pc in pericolo con i processori x86, “difettosi” per 18 anni – ictBusiness.it
Come dire: ah, bello, ottimo!
Un difetto introdotto nell’architettura x86 nel 1997 e passato inosservato fino a oggi permette di realizzare attacchi al livello del firmware, particolarmente insidiosi. Lo ha svelato un ricercatore del Battelle Memorial Institute, con un test realizzato su chip Intel.
Sorgente: Pc in pericolo con i processori x86, “difettosi” per 18 anni – ictBusiness.it