Publishing SSH Fingerprints in DNS

So here’s the thing about SSH: The first time you connect to a server, you have no real idea of if that’s legitimate or not, right? Well, you could compare the key fingerprint to the fingerprint that the server admin gave you and make sure they match, but nobody does that.

Well… there is a way. Using everyone’s favorite always-broken service, DNS.

Continue reading

PGP (GPG) Explained

Pretty Good Privacy, or as it’s more commonly known as by its most popular client’s name, GNU Privacy Guard, is a method of encrypting and/or signing your messages using the power of public key cryptography. And, while it can get extremely complex, the basics of using PGP are, actually, pretty simple. So in the words of the great Angus Deveson, Let’s get started.

Continue reading

Comparing IMAP and POP

For those of you that have ever tried to setup email on your phone that’s more than just GMail, you’ve likely been asked how you want to access the account, either POP or IMAP, and were likely told the difference is that “IMAP keeps messages on the server.” Well, let’s go over the specific differences here, to actually give a more complete understanding of what each protocol is like.

Continue reading

How Git Efficiently Transmits Your Changes

So here’s a fun one. Have you ever noticed that even for huge changes to a repository, a git push only sends over a few kilobytes, maybe a few megabytes at most? If you’re familiar with the internals of git, you know that git stores an entire copy of the new file on commit. So how are these changes so small?

Continue reading
Older posts Newer posts