Quantcast
Channel: Jaharmi’s Irreality - Privacy
Browsing latest articles
Browse All 19 View Live

Teare: How to Steal Passwords from Safari’s AutoFill

Teare: How to Steal Passwords from Safari's AutoFill … somewhat similar to the recently-announced cross-site scripting vulnerabilities in Mozilla Firefox and Microsoft Internet Explorer.[Via the...

View Article



VirtualHost success story

I finally figured out how to get the VirtualHost directives in my Apache configuration to work the way I wanted. I had previously had vhosts defined, but one would always clobber on the other. I...

View Article

Our first son

One week ago, Christen gave birth to Elijah Wesley. He’s our first son and our first child. Although we’ve been prepared just a bit for the experience by having Baxter, our puppy, the experience is...

View Article

Extra Pepperoni: The Apple Keychain is cool, but also strange and problematic

Extra Pepperoni: The Apple Keychain is cool, but also strange and problematic. This article obviously caught some attention, since Perry the Cynic is the first poster in the comments. Heh.[Via Daring...

View Article

I have but one thing to say to Janice

Please, Janice, stop giving out the wrong phone number. Fix this situation already. It’s been two years, now. We’re frankly sick of getting all of these stupid phone calls meant for you.Thank you.

View Article


Thousands of junk trackbacks

I’m not even sure what the utility of trackbacks are, but I have the feature enabled on my Drupal site. Unfortunately, I discovered that this made the site susceptible to junk trackbacks.Given that I...

View Article

The iPhone objections

I don’t know if I will get one. I certainly won’t get one until my Verizon Wireless contract has expired … and even then, there are factors to weigh.But in the meantime, I’ve been staring squinty-eyed...

View Article

Securely deleting the iPhone?

I’m wondering if there’s a way to securely delete the data contents of the iPhone. Since there will be a mix of personal data and media on the device, it seems like a secure deletion routine would be...

View Article


Is root on the iPhone a security flaw?

You may find this odd coming from a relatively security-conscious sysadmin-type person, but I’m not totally convinced that having everything run as root (if that is indeed true) on the iPhone is a bad...

View Article


Image may be NSFW.
Clik here to view.

Full cart

Wow, I must be shopping too much — but not buying enough — at the iTunes Store. I’ve filled it up!I had used the shopping cart feature since my first visit to the iTMS years ago. It has become my wish...

View Article

Using OpenSSL to securely connect to your IMAP account

I never knew how to connect to an IMAP server when SSL/TLS were forced. With unencrypted connections, you can just Telnet in, but this exposes your login credentials and data, so many servers will not...

View Article

Code signing man page in Leopard

I found the man page for code signing in Leopard; it’s found under “codesign”:$ man codesignUpdate: It’s worth noting that Apple has released the Code Signing Guide to document this feature further,...

View Article

Sandboxing man pages in Leopard

I also found the man pages for process sandboxing in Leopard; it’s found under “sandbox”:$ man sandbox

View Article


ADC Leopard release notes

Hm. They actually tell you what’s new in Leopard— from a Mac OS X developer perspective, anyway — in the release notes section of the ADC Reference Library.Who would have guessed? I think I missed this...

View Article

Those who count the votes

Contrast this story at Daring Fireball, refering to this+“Can+You+Count+on+Voting+Machines?”+story+at+the+New+York+Times, with...

View Article


Our long electronic domain nightmare has ended

Yes, I forgot to renew my domain. Yes, that became a real pain very quickly when I realized what the repercussions were.For future generations, I suggest not having to deal with this when:you want to...

View Article

Mac OS X keychain and password storage

I’ve found that trying to explain the Mac OS X keychain at all tends to make peoples’ eyes glaze over. The keychain is poorly-understood overall, perhaps because it tries to bridge the gap between...

View Article


Radmind server logging and the repo command

Under normal circumstances, the latest Radmind tools that communicate with the server report client status updates in the Radmind server’s system log. These standard messages can include ones like:May...

View Article

Addressless Kerberos tickets in Mac OS X

I was concerned when reading Kerberos: The Definitive Guide that Mac OS X clients bound to an Active Directory didn’t have an easy way to specify that their Kerberos tickets should work behind NAT. The...

View Article
Browsing latest articles
Browse All 19 View Live




Latest Images