(originally posted https://tisiphone.net/2018/03/07/the-infosec-amnesty-qa/ with thanks to Lesley “Hacks4Pancakes” Carhart) Here’s why I know about this My tech journey started in academia, where I spent my time writing math in Java. As I transitioned more and more to tech, I ended…
Category: Uncategorized
How much should startups spend on information security
When you have little to no budget, how do you start spending on information security in a startup to protect customer data and operations? I was asked to comment on this via email by Zack Whittaker for a story he was doing…
Yes, there was a hidden epic cryptographic puzzle story inside my book, “Women In Tech.”
And the champions just received their solid silver medals for solving the series. EDIT: the writeup in Techdirt by Mike Masnick was lovely. Five Years Later, Team Solves Puzzles In Women In Tech Book I wrote a book called Women…
Your private ssh keys do not copy over with a sudo dolphin! You must use bash in Kubuntu.
I’m glad I keep good backups. When backing up your Kubuntu box, do not just drag and drop one home folder from a hard disk to another hard disk. Your ssh keys will not be copied over, even though you…
An update to the bash script that takes a parameter:
#!/bin/bash book=$1 [[ -z $book ]] && { echo “No argument supplied, exiting!”; exit 1; } [[ ! -e $book ]] && { echo “Can’t find a file with the name $book, exiting”; exit 1; } title=${book%.*} bookcounter=0 linecounter=0 sed…