Saturday, November 9, 2013

Microsoft Office jumps to the net

Remember when Google Docs came on the scene and some commentators said it was the beginning of the end for Microsoft Office? Well, it seems Office may have turned the tables. See here, too.

Things to come

The Open Innovation Forum shares some interesting perspectives on how technology is changing the human race and will continue to do so ahead.

Monday, October 14, 2013

Easy home theater option

Sound bars are a neat way to drop in home theater easily, provided you're not a high-end audiophile. There may be other limitations, too - but if you want an easy installation with few or no wires required - they're worth a look.

Sunday, October 6, 2013

Creepy robotics

This stuff is downright creepy to me. I guess I've read one too many Sci Fi stories about robots used for nefarious purposes. These surely give pause for concern - and unfortunately the trend is only likely to continue. It looks like drones are just the tip of the iceberg, folks.

Wednesday, September 18, 2013

The Third Industrial Revolution

Here's a thought-provoking article that makes me wonder about what the near future will hold. Will we see an idealistic world of increased freedom from menial toil and labor, or a dystopian society where displaced workers and their families struggle to survive? Will the gap between rich and poor become so great that social upheaval and struggle is unavoidable? Or will we be able to provide opportunities for all to survive and prosper? As a society and culture, I think we must challenge ourselves to seek and shape the best possible outcome now.

Sunday, September 8, 2013

Windows Sysinternals Tools

Windows Sysinternals is an incredibly useful tool suite for Windows devs, admins, and IT pros available for free from Microsoft Technet.

Monday, August 26, 2013

Using openssl to encrypt/decrypt text

Here's a simple example of using the Linux openssl command to encrypt typed text data into a file and then extract it back from the file afterwards. We'll use the AES-128 encryption algorithm for this example and ask openssl to base64 encode the encrypted data afterwards, so it can be happily stored in a text file.

First, let's encrypt a test string into the file /tmp/myEncryptedData.txt:

$ openssl enc -aes128 -a -out /tmp/myEncryptedData.txt
enter aes-128-cbc encryption password: your-desired-password-here
Verifying - enter aes-128-cbc encryption password: your-desired-password-here

This is the data I'm protecting ya know!


Note: To terminate the input type a couple of Ctrl-D characters.


Now, let's read the encrypted text from /tmp/myEncryptedData.txt and display the original string back:

$ openssl enc -d -a -aes128 -in /tmp/myEncryptedData.txt
enter aes-128-cbc decryption password: your-desired-password-here
This is the data I'm protecting ya know!


Cool, huh?

Wednesday, August 21, 2013

Privacy in the digital age

A favorite author of mine has posted an interesting perspective on privacy that's worth a read. The topic's been on my mind, too. I'll be adding some discussion about it ahead, too.

Thursday, August 15, 2013

I'm so happy someone else wonders about these things, too

It's occurred to me on multiple occasions that if a hacker or agent can spoof software update processes, they can easily gain complete control of an end user system. So far, no such exploits have been seen to my knowledge, though.

Anyway, here's a serious yet ultimately humorous discussion of potential software update system exploitation - and how it might perceptually relate to cloud computing.