Latest articles
-
Running the operating system that you're currently using in a virtual machine (with Secure Boot and TPM emulation)
-
How to run Remark42 on Fly.io
-
My journey from Disqus to Remark42
-
On ignoring mistakes, resilience, and the hidden dangers therein
-
Authenticated encryption: why you need it and how it works
-
What time is it? A simple question with a complex answer. How computers synchronize time
-
Can we encrypt data using Elliptic Curves?
-
The curious case of bad blocks on an SSD, and how I got rid of them
-
How to use the same DNS for all connections in Ubuntu (and other network privacy tricks)
-
11 years of Ubuntu membership
-
Running Docker Swarm inside LXC (outdated)
-
When bureaucracy hits the web: the cookie law
-
Hello Pelican!
-
Let's Encrypt is going to start soon
-
Elliptic Curve Cryptography: breaking security and a comparison with RSA
-
Elliptic Curve Cryptography: ECDH and ECDSA
-
Elliptic Curve Cryptography: finite fields and discrete logarithms
-
Elliptic Curve Cryptography: a gentle introduction
-
Let's Encrypt: the road towards a better web?
-
Running Ubuntu Snappy inside Docker
-
Are LXC and Docker secure?
-
Prime numbers and universe factories
-
New blog, again