1. Setting Up a SOCKS Proxy Using OpenSSH

    Web browsing on a public Wifi network is a security risk as it's quite simple to capture network traffic. Even if you only connect to SSL-protected sites, people can still find out which web sites you're accessing. Fortunately, there is a quick way to protect your privacy - all you need …

    read more
  2. Setting Up a Web Proxy with Squid

    Setting up a Squid forward proxy can be a pretty daunting task since Squid is an extremely flexible piece of software. In this article, I'm going to provide a minimal non-caching, authenticated configuration. I have tested this with Squid 3.1.12 on Ubuntu 13.04, but with minor adjustments …

    read more
  3. Quick Tip #5: Navigating in Source Trees

    I often move around in checked out Subversion or Git source trees on a Bash command line. Directory structures tend to get quite deep (especially in Java projects), so one problem keeps coming up frequently: Changing back to the base directory of the source tree. Typing "cd .." ten times is …

    read more
  4. Getting Started With Kerberos

    Recently, I have been playing with Kerberos, a popular Single Sign On system (SSO) that is used in many large organizations. My first contact with Kerberos has been at university in a network security course, but that only covered the cryptographic part, not the more practical issues like setting up …

    read more
  5. Undoing Things With Git

    Sometimes bad things happen in a software project and you have to revert a change that has already been committed. There are several ways to do this with Git, including Git's slightly scary ability of changing history. I'll show you the techniques I found most useful.

    The classic way of …

    read more

« Page 2 / 7 »

social