See also: Heapify

Pages: 1 2 3 4 5 6 7 8 9 10 11

Setting up synergy auto-start securely

Synergy is a popular application for sharing a keyboard and mouse between multiple computers on multiple operating systems using your network. One of it's biggest flaws is that the underlying protocol is unencrypted. This means that people could potentially read what you type remotely. This article describes a method for setting up an encryption layer for Unix-like and Windows machines as well as automatically starting Synergy on system boot-up without user-prompts.

While I have no doubt there are several articles on this subject elsewhere, I'm going to give you a walk through from my point of view about how you can set up synergy across multiple Windows and Unix-like systems securely.

This walk through will be divided into two parts. First will be Unix-like setup and the second part will be Windows setup.

...

Read more

There is 1 comment on this post.

Setting up an OpenID delegate for Verisign

OpenID, the "decentralized standard for user authentication and access control" has a nice feature whereby you can use your own domain as your OpenID login.

Basically you put a few lines of HTML in your <head> tag, and any OpenID supporting basically treats it as a redirect.

I have a Verisign PIP OpenID account, to login to various sites (such as the Stackoverflow "family" of sites), but I can use my own domain (dbrweb.co.uk) as a login.. I could run my own OpenID "endpoint", but this is much simpler, and more secure (as Versign will do a better job than I could)

...

Read more

There is 1 comment on this post.

Woods Don't Go [video]

Another short film my brother an I created last weekend (previous one is here)

Stuart announced his retirement from sundayleague.com. This is my attempt to make him reconsider

...

Read more

There are no comments on this post.

Transparent Telephony - Part 1 - An Introduction

So you've probably heard the word telephony thrown around from time to time. Maybe you were hanging out in a certain IRC channel, wanted to root your cell phone, or maybe, just maybe, you were actually interested in doing something cool with your computers and phones.

This article is the first of a series. I'm going to try my best to explain what telephony is, how it works, and how to write cool programs that integrate voice and data. Telephony is a huge market, and used everywhere (think cell phones). We are living in a time when telephony is casual, common, and popular. While being so huge, it often astounds me to think of how few programmers and tech people ever get around to learning about it, or playing with it. There are very few telephony programmers, and even less proper documentation. My hopes are that these articles will give you a solid foundation in telephony and inspire you to play around with it on your own, and do cool things.

Now that we've got the basics out of the way, let's get down to business...

...

Read more

There are 6 comments on this post.

All the video-DSLR's are broken

Discussing the current state of video-capable DSLR cameras

Note: There's a summary for the impatient!

In August 2008 Nikon released the D90, the video DSLR that shot HD video.

The concept was apparently aimed at news-gathering, where reporters who would usually have to carry both a DSLR for photos and a separate video camera, could instead carry a single device capable of both shooting stills and, at the press of a button, shoot HD video.

For completely different reasons, these VDSLRs also appealed to film makers - a wide range of changeable, affordable lenses and large sensors capable of creating "filmic" shallow depth of field.. but, film-makers and news-gatherers have very different needs, and all VDSLR's thus far have been, in various ways, broken..

...

Read more

There are no comments on this post.

Conky configuration

I spent a bit of time making a nice conky configuration for my amusement. I thought I'd share.

Preview:

Conky Preview

...

Read more

There is 1 comment on this post.

Hiding OS X system directories

After restoring a backup, the various OS X system folders became visible again (such as /bin /mach_kernel etc)

The following command (adapted from this post by Wowzera) will hide them again:

# Hide sym-links
SETFILECMD="/Developer/Tools/SetFile"
for cdir in /etc /tmp /var;
    do sudo $SETFILECMD -P -a V $cdir;
done
 
# Hide directories
for cdir in /bin /cores /mach_kernel /private /sbin /usr /Volumes; do
    sudo $SETFILECMD -a V $cdir;
done

Launch Terminal (in Applications, then Utilities), and paste the above script.

...

Read more

There are no comments on this post.

Hashing: the whats and the hows

Introduction

Hashing normally makes people think of cryptographic hashing often used to store passwords. Understandable considering this is what users might more familiar with. However, the principles of hashing are used for more than simply preventing retrieval of certain data.

What I'm referring to is hashing for the purposes of efficient data referencing. This is better known to developers rather than users.

...

Read more

There are 2 comments on this post.

Simpletons guide to git

Simpletons guide to git

This is simply a "click these buttons" guide to git. See the last section of the article for more advanced/better guides and resources.

Installing

...

Read more

There are 2 comments on this post.

Utility to create executable Python scripts for Microsoft Windows

This file is a utility script for building an executable script that users of the Windows operating system can double click on to start their Python application. This utility can be especially useful if your Python application does not need to display the command prompt.

I hope somebody will find this useful :-)

...

Read more

There are no comments on this post.

Pages: 1 2 3 4 5 6 7 8 9 10 11

RSS
Powered by Debian, Guinness, and excessive quantities of caffeine and sugar.