Web browsing on a public Wifi network is a security risk as it’s quite simple to capture network traffic. Even if you only connect to SSL-protected sites, people can still find out which web sites you’re accessing. Fortunately, there is a quick way to protect your privacy – all you need is a host on the public network that you can access via SSH.
So you found an awesome new technology and it changed your life. Two weeks in and it feels like you’ve been taken from stone age to space age. Good for you, but better still if you can help others see the light. Thousands are still hacking away with substandard programming languages, libraries, and tools. It is your obligation to save them.
Posted in misc
When setting up a Hadoop cluster using Debian packages, it’s often useful to work with a local mirror. In this article, I’ll walk you through creating an apt mirror for Cloudera’s Hadoop distribution.
Setting up a Squid forward proxy can be a pretty daunting task since Squid is an extremely flexible piece of software. In this article, I’m going to provide a minimal non-caching, authenticated configuration. I have tested this with Squid 3.1.12 on Ubuntu 13.04, but with minor adjustments it should work for other systems as well.
A few days ago I bought a larger and faster disk for my Dell Precision M65 notebook. If it wasn’t for the new disk, I would have never tried the latest Ubuntu (13.04, aka “Raring Ringtail”), because 12.04 worked fine for me. Feature-wise I haven’t noticed a lot of new stuff, so if you’re happy with the previous version, stick with it, it’s an LTS which has support until 2017, while 13.04 is only supported until early 2014. Anyway, here’s my first impression.
Posted in linux
Tagged linux, ubuntu
I often move around in checked out Subversion or Git source trees on a Bash command line. Directory structures tend to get quite deep (especially in Java projects), so one problem keeps coming up frequently: Changing back to the base directory of the source tree. Typing
"cd .." ten times is tedious. Some people use their
"...", or even
"...." aliases for that, but there’s a more elegant way.
Recently, I have been playing with Kerberos, a popular Single Sign On system (SSO) that is used in many large organizations. My first contact with Kerberos has been at university in a network security course, but that only covered the cryptographic part, not the more practical issues like setting up an implementation and using it.