Thunderbird in Linux, for some reason, still does not understand GIO filesystems. If you have a network location connected in your file manager (such as Nautilus) you can browse around, copy files and so on – but Thunderbird cannot see those locations. In particular, it can’t attach files out of those locations, not can it save attachments to those locations. Luckily, gvfs
provides a workaround.
AWS MFA QR Code tool
As someone with administrator responsibilities on several AWS accounts, I have MFA (multi-factor authentication) enabled for lots of AWS identities – SSO logins, IAM users and root users. I use a virtual MFA device – i.e., a mobile phone running Google Authenticator. The QR codes that AWS displays when activating MFA have some irritating properties…
Ode to a ThinkPad T30
Way back in 2003, I bought a ThinkPad T30. Yesterday, July 10 2017, I turned it off for probably the last time.
Upgrading MoinMoin
A better, safer admin user for AWS
If you use AWS, you probably have a root user and one or more administrator users. If you are following best practice you have secured all logins with MFA, and you rarely if ever use the root user. Instead, you log in as one of the administrator users. The problem with that is that as long as you are logged in, you can do anything – including make disastrous mistakes. Wouldn’t it be nice to have all the power of an administrator at your fingertips, but only when you actually need it?
Two-factor authentication – do it now.
The online world has become too dangerous for us to keep protecting ourselves with no more than a username and a password. Especially when most of us choose stupidly simple passwords. Even if you choose a good one – upper and lower case, special characters, letters and numbers – you now need such a long one that no human can remember it. Tools like LastPass are great, but only if you also use ridiculously long passwords. Pretty much the best protection you can give yourself is a simple thing called two factor authentication. It’s simple, it’s free, and it’s very effective.
The cure for darkness is light. Not more darkness.
The matter of data centre security was raised recently on a network mailing list I subscribe to. Someone was wondering if data centres checked incoming equipment for “bad stuff” – explosives and what-not.
The reaction from some was “don’t talk about that, we don’t want to give people ideas”. What a muddle-headed response!
Use a Mikrotik as a wifi converter
The situation: You have a computer with no wifi, and you have an access point. No wifi, so no Internet. Sad face. But if you have a MikroTik router with a wifi interface and a couple of Ethernet interfaces, you can set up a private Ethernet network and connect your computer to wifi through the MikroTik.
Making ssh even more secure
ssh is just about the most secure way you can provide access to a system. But even ssh is subject to attacks. You can reduce the likelihood of a breach even further with a few fairly simple steps. The specifics below are for Ubuntu 16.04, but the principles are the same for any modern Unix.
Electric toothbrush yuk nope nope nope
After using my electric toothbrush I always rinse the whole detachable head, dry the bristles, remove the head and tap out any water. Yesterday when I tapped out the water (from the open end that sockets onto the handle) a tiny black speck appeared on the white porcelain of the basin. Hm, I thought.