A picture of aq resume

πŸ’Ό Resume in JSON Format πŸ‘©β€πŸ’Ό πŸ“‹ πŸ“Ž

This is worth sharing: Thomas Davies (jsonresume.org) has made a online resume host and formatter, so long as your resume is in JSON format. Let’s check it out… ...

March 18, 2022 Β· 2 min Β· Jas
C programming indent rules from Plan 9

πŸ’» Style9 Indent Rules on Linux/OpenBSD 🐧 🐑 πŸ‘©β€πŸ’»

Get that lovely Plan9 source feel in your C code on Linux or OpenBSD Kernel Normal Form Kernel normal form 1, or KNF, is the coding style used in the development of code for the BSD operating systems. According to the OpenBSD man pages 2: This file specifies the preferred style for kernel source files in the OpenBSD source tree. It is also a guide for preferred userspace code style....

March 11, 2022 Β· 2 min Β· Jas
An old letraset transparency

πŸ’» How To Setup A Yubikey β›“ πŸ” ✨

A Yubikey is a physical security device for your computer (and phone if you get the NFC version). In this post we will look at adding GPG and SSH keys to the Yubikey for additional privacy and security. ...

March 1, 2022 Β· 12 min Β· Jas
Elaborate looking key on an old leather desk blotter

πŸ’» Send and Receive GPG Email on MacOS β›“ πŸ” πŸ‘©β€πŸ’»

This guide is part of my series: The Ultimate Guide to GPG for Email Security. This particular page is about creating new keys for the GnuPG program on your computer. ...

February 25, 2022 Β· 4 min Β· Jas
Trinity from Matrix hacking on the Linux commandline

πŸ’» Linux CLI Reminder πŸ‘©β€πŸ’» πŸ“Ί 🐧

I find myself Google-ing for command-line fu a lot more than I should, here are some favourites… rsync with ssh Although this should be the default by now, really, who trusts the defaults? Manage it yourself with something like this: rsync -avP -e "ssh -i ssh_key_file -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null" /home/jas/local-dir/* remote-user@webhost.com:/home/server/www/yourdomain.com/ Rainbow Shell Prompt Put this in .bashrc or wherever is appropriate for your OS: export PS1="\[$(tput bold)\]\[$(tput setaf 1)\]\u\[$(tput setaf 208)\]@\[$(tput setaf 3)\h\[$(tput setaf 2)\]:\d \[$(tput setaf 4)\]\@:\[$(tput setaf 55)\]\w\n$PROMPT_COLOR\$ \[$(tput sgr0)\]" YouTube-dl on Linux Obtain it from here: https://github....

February 10, 2022 Β· 5 min Β· Jas
Elaborate looking key on an old leather desk blotter

πŸ’» Exchanging GPG Public Keys β›“ πŸ” πŸ‘©β€πŸ’»

This guide is part of my series: The Ultimate Guide to GPG for Email Security. This particular page is about creating new keys for the GnuPG program on your computer. ...

February 3, 2022 Β· 2 min Β· Jas
A physical RamDisk device from Gigabyte

πŸ’» Ramdisk (tmpfs) for MacOS πŸ’Ύ πŸ‘©β€πŸ’» 🍏

This post contains a cute script to mount and unmount a ram disk device on MacOS, and also a couple of notes about wear leveling on SSD and how this script is different to tmpfs from Unix/Solaris. ...

January 18, 2022 Β· 7 min Β· Jas
Elaborate looking key on an old leather desk blotter

πŸ’» Create GnuPG Master Keys and Subkeys β›“ πŸ” πŸ‘©β€πŸ’»

This guide is part of my series: The Ultimate Guide to GPG for Email Security. This particular page is about creating new keys for the GnuPG program on your computer. ...

January 12, 2022 Β· 6 min Β· Jas
Trinity from Matrix hacking on the Linux commandline

πŸ’» Strip Image EXIF Data πŸ“Έ πŸ‘©β€πŸ’» 🐧

Did you know that all of your images contain a bunch of metadata? This is mostly harmless. But actually some of the metadata is not harmless. Dianne Feinstein, an American, famously said, post-Snowden, that β€œOur courts have consistently recognized that there is no reasonable expectation of privacy in this type of metadata information and thus no search warrant is required to obtain it”. Yikes! Also, note that the EFF have thoughts on fingerprinting of digital cameras, printers, CD ROM burners, and MAC addresses in routing devices....

December 21, 2021 Β· 4 min Β· Jas
Elaborate looking key on an old leather desk blotter

πŸ’» Installing and Configuring GPG β›“ πŸ” πŸ‘©β€πŸ’»

This guide is part of my series: The Ultimate Guide to GPG for Email Security. This particular page is about installing and configuring the GPG program on your computer. ...

December 19, 2021 Β· 1 min Β· Jas