A blog about tech, programming, security, and various other subjects.



FTP PORT command  Tags: networking.
A while ago I searched for it quite a bit but couldn't really figure out how to understand the PORT command, visible in Filezilla FTP:
PORT 83, 161, 210, 237, 5, 7

The first four parameters are obvious to me, it is my external IP address. But then the last two... They turn out to be the port which is used (Commandname, anyone? :P), but how does it know what port to use now?

After Googling a lot I found out that both numbers are 8-bit integers and together they can make up the 16 bit port value.
Keyboards rock  Tags: keyboard.
I love working with the keyboard instead of the mouse. Or even rather, not moving my hands from their position at all.

A mouse is not a binary system. I'm not sure who said it, but someone had the experience that computer people think in binary. Things are black or white, the key is pressed or not, the value is 1 or 0. And actually, he or she is probably right. I can't really explain why I think that, but it seems to be. My dislike for mice and touchscreens is probably a good example though.

A few weeks ago I met Vim, a text editor meant for Unix.
Windows installation with narrator  Tags: windows, computers.
Installing Windows, or any other Operating System for that matter, is often a bit boring. You can't do what you want on the system until it's completed, time between steps is often a bit long but also too short to really go do something else, etc.
I said to someone as a joke I would not attach a screen or mouse and do everything by keyboard blindly. That would have been easy once in Windows, but the installation is always a bit different and I do it like five times every year so I don't know that by heart.
So I didn't think it would actually be possible, but if I had looked up a screenshot of the first one or two setup screens I would have.
Secure login systems  Tags: webdevelopment, security.
What a secure login system should be like:
  1. The password field must hide the password;
  2. The login processing script must be called via HTTPS, or if over HTTP the login must be hashed before transmission;
  3. The password should be hashed via a secure hashing algorithm, I consider sha1 the minimum;
  4. The hash should be salted;
  5. The username or another static and user-specific should be included with the salt;
  6. The hash should be run a lot of times, like 100
Date and time system  Tags: datetime.
I remember asking my mom once why there were 60 minutes in an hour, or 60 seconds in a minute or something. I think I was about 8 years old, and didn't understand why they didn't take a round number like 50 or 100. It would make calculations with time at elementary school so much easier. She answered it otherwise wouldn't work or something... Whatever it was, there wasn't time to discuss the matter much further.

Nowadays I know the answer: Because it can be 60. It could also have


Previous page / Newer posts
Next page / Older posts
 
lucb1e.com

Circle on Google+
Follow at Twitter


Tagcloud:
AI apps chat computers databases datetime e-mail hardware keyboard keyboards lol me music my blog my server networking nostalgia other privacy programming randomthought real life school security social networks software spam tutorials webdevelopment webhosting websites Windows writing
Contact Me (test)