Behind the scenes: Reality of running a blog - Story of a failure
... or any (un)social media activity.IMHO the mentioned "social" media isn't. There are statistics and research to establish the un-social aspect of it. Dopamin-loop in your brain keeps feeding regular...
View ArticleGoogle Drive spam
A completely new type of spam has been flooding my mailbox. Ok, not flooding, but during past week I've got 7 different ones. The general idea for this spam delivery method is for the spam to originate...
View ArticleSD-Cards - Deciphering the Hieroglyphs
Luckily xkcd #927 isn't all true. When talking about memory cards used in cameras and other appliance, SD has taken the market and become The Standard to rule all standards.In my junk-pile I have all...
View ArticleStop the insanity! There are TLDs longer than 4 characters - Part 2
What happens when IT-operations are run by incompetent idiots?For reference, I've written about State of Ubisoft and failures with top level domain handling.I'm an avid gamer. I play games on daily...
View ArticleUpgraded Internet connection - Fiber to the Home
Seven years ago I moved to a new house with FTTH. Actually it was one of the criteria I had for a new place. It needs to have fiber-connection. I had cable-TV -Internet for 11 years before that and I...
View ArticlePython 3.9 in RedHat Enterprise Linux 8.4
Back in 2018 RHEL 8 had their future-binoculars set to transitioning over deprecated Python 2 into 3 and were the first ones not to have a python. Obviously the distro had Python, but the command...
View ArticleR.I.P. IRC
That's it. I've done IRCing.Since 1993 I was there pretty much all the time. Initially on and off, but somewhere around -95 I discovered GNU Screen and its capability of detaching from the terminal...
View ArticlePasswords - Part 1 of 2
In computing, typing a password from keyboard is the most common way of authenticating an user.NIST Special Publication 800-63B - Digital Identity Guidelines, Authentication and Lifecycle Management in...
View ArticlePasswords - Part 2 of 2 - Leaked passwords
This is the sencond part in my passwords-series. It is about leaked passwords. See the previous one about passwords in general.Your precious passwords get lost, stolen and misplaced all the time. Troy...
View ArticlePasswords - Part 3 of 2 - Follow up
This is part three of my two-part post. My thoughts on passwords in general are here and about leaked passworeds here.I'm writing this to follow-up on multiple issues covered in previous parts. Some of...
View ArticleDynDNS updates to your Cloud DNS - Updated
There is a tool, I've been running for a few years now. In 2018 I published it into GitHub and wrote a blog post about it. Later, I wrote it to support Azure DNS.As this code is something I do run in...
View ArticleDecoding EU Digital COVID Certificate
If you live in EU, you most definitely have heard of COVID Passport.Practically speaking, it is a PDF-file A4-sized when printed and can be folded into A6-pocket size. In Finland a sample would look...
View ArticleWi-Fi 6 - Part 1 of 2: Brief primer on wireless LAN
Wi-Fi. Wireless LAN / WLAN. Nobody wants to use their computing appliance with cords. Yeah, you need to charge them regularily (with a cord or wireless charger). To access The Internet, we all love, is...
View ArticleWi-Fi 6 - Part 2 of 2: Practical wireless LAN with Linksys E8450
There is a previous post in this series about wireless technology.Wi-Fi 6 hardware is available, but uncommon. Since its introduction three years ago, finally it is gaining popularity. A practial...
View ArticleNokia 5.3 got Android 11 upgrade
There it is:This update was promised on 8th September 2020, roughly an year ago. See: https://twitter.com/nokiamobile/status/1303384763705819157As promised, there it is. And for iPhone user like me,...
View ArticlemacOS Big Sur 11.1 update fail
Big Sur was riddled with problems from getgo. It bricked some models, started installing when there was not enough disc space available and all kinds of weirness. Quite few of the minor versions had...
View ArticleWebAuthN - Passwordless registration and authentication of users
WebAuthN, most of you have never heard of it but can easily understand it has something to do with authenticating "N" in The Web. Well, it is a standard proposed by World Wide Web Consortium or . In...
View ArticleWebAuthN Practically - Yubikey
Basics of WebAuthN have been covered in a previous post. Go see it first.As established earlier, WebAuthN is about specific hardware, an authenticator device. Here are some that I use:These USB-A /...
View ArticleWebAuthN Practically - iOS 15
As Apple has recently released iOS 15, and iPadOS 15 and macOS 12 will be released quite soon. Why that is important is for Apple's native support for WebAuthN. In my WebAuthN introduction -post there...
View ArticleWhy Windows 11 won't be a huge success
Lot of controversy on Microsoft's surprise release of Windows 11. I'm not talking about when they declared Windows 10 to be the "last Windows" and then releasing 11. Also changes in GUI have lots of...
View Article