Artikel in Kategorie "Technik"

GRE Setup for Bacula on a Mobile Client

The way Bacula works is: A backup client runs a TCP server process bacula-fd, waiting for a backup server process bacula-dir to connect and perform backup and restore jobs. There is a simple authentication mechanism, where bacula-dir presents a shared secret to bacula-fd to be granted access. Opening the bacula-fd TCP server on an exposed […]

Create or Append a debian/changelog Entry

Since i always have to look this up, everytime i need it, i write it down once, as „note to self“! NAME=“John Smith“ EMAIL=j.smith@example.org \ dch –create \ –package my-package \ –newversion 0.1 \ „Initial release“ And that’s it! 🙂

Generate Certificate Signing Requests (CSRs) for TLS Server Certificates

Overview In this article, a procedure is described to generate multiple certificate signing requests (CSR) for TLS servers, such as SMTP-, IMAP- or HTTP-servers, so that we can submit them to a Certificate Authority (CA). The CA will eventually perform the signature and return a public certificate to us. A Shell and the software OpenSSL […]

Methods of HTTP Caching

Preface I find the world wide web and the spectrum of methods and instruments that make it happen full of dubiousness and opportunity alike. Caching is generally known as one of the „hard problems“ of information science, and this is not different when it comes to technologies of the web. The text presented here, as […]

Protokoll meines Vortrags „Bourne Shell“ bei UUGRN e.V.

Ich hatte am 5.2.2021 die Ehre, einen Vortrag zum Thema „Bourne Shell“ auf der Veranstaltung FIXME der UNIX-User-Group Rhein Neckar, UUGRN e.V. halten zu dürfen. Hier ein Link zu den schriftlichen Aufzeichnungen dazu: https://wiki.uugrn.org/Bourne_Shell Abseits des Vortrags, den ich auch mit Live-Demos usw. durchgeführt habe, hat die Mitschrift nur begrenzten Nutzen, aber die Linkliste am […]

Python3 GTK3 TextView Drag-and-Drop Example

Just a small finger exercise …

There is no such Thing as „End-to-End-Encryption“

A communication between two communication partners, which on a technical level can also be called „endpoints“ or „ends“ of a connection (or more general, of a channel of communication), is either encrypted, or it is not. If somewhere in between the „ends“ of the connection, encryption takes place, such that there exist parts of the […]

Bourne to Bourne Again Shell Forward Compatibility

Introduction In this article i try to find out, if Bourne Shell scripts are runnable in Bourne Again Shell without modification. If not, i advice on how to modify the code so that it runs on both Shells. An interpreter for some variant of Bourne Shell is available as an executable /bin/sh on most Linux […]