How would you compare these editors? What are the pros and cons of each? [note] This is not meant to be answered by those who “hate one and love another” or those who haven’t used both.

Sorgente: What are the pros and cons of Vim and Emacs?

That’s so funny!

A Song Of Regret – YouTube

  Song of regret
(Peter Sinfield – Angelo Branduardi)

Winter’s frozen moments
Will melt once more to spring,
Birds with peppered feathers
Return once more to sing…
But so high soars the mountain
That though I climb and climb
She always hides her flowers from me…

In long ago’s lost garden
The apple trees will bear
A thousand fruits of red and green
But not one will I share…
For constant must I travel
And in some far off land
Lie down once more remembering

<

p class=”text6″>Every time I meet this wonderful song by Angelo Branduardi I cannot help but stopping everything I’m doing and stand still listening to it.

Moving a GPG Key (Privately) | Short-Circuit Synapse

Sometimes I have to move my GnuPG key between computers for some reason, and although GnuPG does have features to export your private key, they are not as well documented, probably out of choice to discourage their use, as they can be a security issue. I have developed the following method to export both the public and private keys together, so that they can be easily imported, and with the minimum of secret data written to disk.

  1. Find out the keyid of the key you wish to export. You can get this from the output of
    gpg -K

    Note that the capital K is important so that it lists secret rather than public keys.

  2. First, export the public key. This is of course public info, so no worries about security here
    gpg --output pubkey.gpg --export {KEYID}

  3. Now, in one fluid step, we will export the secret key, combine it into one file with the public key, and then encrypt it for transfer
    gpg --output - --export-secret-key {KEYID} |\
     cat pubkey.gpg - |\
     gpg --armor --output keys.asc --symmetric --cipher-algo AES256

    You will be prompted for a passphrase during this, this is the passphrase just for this temporary encryption for transfer. So use a good passphrase for security, and remember that passphrase!

  4. Now, transfer the keys.asc file to the new computer or wherever. Because it’s encrypted you could technically do this over the internet and it should still be secure, but I would suggest not using the internet for added security. When I last did this I just used a normal flash drive.
  5. On the new computer, we need to import the keys from the file. So, run this command to unpack and then import the keys (using pipes again)
    gpg --no-use-agent --output - keys.asc | gpg --import

  6. And that, should be, that.

Sorgente: Moving a GPG Key (Privately) | Short-Circuit Synapse

Pc in pericolo con i processori x86, “difettosi” per 18 anni – ictBusiness.it

Come dire: ah, bello, ottimo!

Un difetto introdotto nell’architettura x86 nel 1997 e passato inosservato fino a oggi permette di realizzare attacchi al livello del firmware, particolarmente insidiosi. Lo ha svelato un ricercatore del Battelle Memorial Institute, con un test realizzato su chip Intel.

Sorgente: Pc in pericolo con i processori x86, “difettosi” per 18 anni – ictBusiness.it