PostGIS is a fantastic, battle-tested suite of GIS extensions for Postgres. It handles most aspects of it, and is widely used, for example in OpenStreetMap’s Mapnik. But for your project, it’s most likely overkill. In a Q and A fashion, let’s discuss reasons for (not) using it. I need to...
In the last post we decoded the internals of an encrypted private key, basing our work on previous efforts in reading unencrypted ones. We ended up with a still unsolved question on how to conveniently use these keys, which require a password to be operational. In this post, we’ll dig...
Previously we learned about the bazillion things that ssh-keygen can do; and before that we dissected SSH keys themselves. Now it’s time to consider: how do we store them securely? Private keys are sensitive While public keys are designed to be shared, private keys are very different. Their confidentiality is...
In the previous post we ran ssh-keygen once and then proceeded to dig inside the key files it produces. In this follow-up, we’ll discuss all its capabilities, which go far beyond key generation. ssh-keygen If we look at its manual page ssh-keygen(1), we’ll find that it lists 20 invocations of...
SSH is a great tool but it can also be pretty complex. Therefore it is often misunderstood, misused or underutilized. In this short series of two articles we’ll go into what SSH is, how exactly it works and how we can use it most effectively and securely, avoiding common pitfalls....
Leave your name and e-mail, and we'll write you back.
…or just email us at [email protected]
By submitting your name and email address you allow us to use it for business purposes. Don't worry, your data is safe with us, we'll use it only to contact you.