Author Archives: Jacco

Buzzword bingo, or how to survive long meetings

Working in the IT industry can be very exiting. But not always. There is quite some communication involved when working in a team, and some of those meetings are filled with dull moments to get through, and I must admit … Continue reading

Posted in Web | Tagged , , , , , , , | Comments Off on Buzzword bingo, or how to survive long meetings

Resizing multiple images

I’m sure there are easier ways, and better I assume, to reduce the size of multiple images at once. But there was some point in time where I couldn’t resist the urge of solving this myself using ImageMagick and Tcl/Tk. … Continue reading

Posted in Image processing, Shell script | Tagged , , , , , , , | Comments Off on Resizing multiple images

Encrypted FreeBSD USB boot disk

It appears that USB attached storage devices resemble what floppy disks were back in the nineties. Back then, transporting floppies from one computer to another was very common. Unintentionally spreading malware and losing disks also. The risk of spreading malware … Continue reading

Posted in Crypto, FreeBSD, IT Security | Tagged , , , | Comments Off on Encrypted FreeBSD USB boot disk

Booting FreeBSD from a USB disk

Open source software has found its way in every corner of the IT industry. Which is great, as it provides possibilities that were otherwise to expensive to pursue. In general, there is (at least) one down-side to using open source … Continue reading

Posted in FreeBSD | Tagged , , | Comments Off on Booting FreeBSD from a USB disk

Memoirs of email

Email. Practically everyone connected to the Internet has at least one email address. Not surprisingly: If you get connected to the Internet, one of the first things to do is inform your friends and family on how to reach you… … Continue reading

Posted in email | Tagged , , , , | Comments Off on Memoirs of email

PFlogging 2.0

It’s no secret that I’m a big fan of computer systems that are running a Unix-like or Unix-derived operating system. There are quite a few around me right now, running FreeBSD, Linux-Mint and Mac OS X Lion. I have a … Continue reading

Posted in FreeBSD, IT Security | Tagged , , , , , | Comments Off on PFlogging 2.0

Brute force attacks from A to Z – part II (last)

Passwords are a regrettable nuisance. Perhaps even one of the most dreaded inconveniences of computer security. This last part will contain some very basic examples that will demonstrate brute force attacks on passwords. The beauty of a brute force attack … Continue reading

Posted in IT Security | Tagged | Comments Off on Brute force attacks from A to Z – part II (last)

Rotating photos automatically

Stuff you need to do that just sneaks up on you. I’m sure this has happened to the most of us. This article is about one of those that is really high on the list of the “things to fix” … Continue reading

Posted in Photography | Tagged , , | Comments Off on Rotating photos automatically

Brute force attacks from A to Z – part I

After reading and watching some very interesting views on the use of strong passwords, I must say that I don’t think we will ever be able to do without passwords. They’re here to stay. I’ll bet that the average person … Continue reading

Posted in IT Security | Tagged , | Comments Off on Brute force attacks from A to Z – part I

Creating FreeBSD jails disregarding the manual

Computer virtualization has been around for quite some time as any mainframe guru will tell you. If you search around the Internet for information on this subject, you’ll find tons of references to different types of virtualization. VMware, Virtualbox, Qemu … Continue reading

Posted in FreeBSD | Tagged | 1 Comment