Tags » Private-key

Let’s talk about encryption

Why are politicians sometimes such idiots? The French recently voted to criminalise bosses of tech firms who refused to decrypt user data when requested. Don’t worry, it’s not law yet, and likely won’t ever be, but you have to ask yourself how hard it is to understand how encryption works. 491 more words

Security

Locked Out: Estate Planning for Bitcoin, Altcoins, & Asset-tokens

Locked Out: Estate Planning for Bitcoin, AltCoins, & Asset-Tokens
by Pamela Morgan of Empowered Law PLLC;

Download a PDF of this article.

Do you know if your clients own… 1,092 more words

Bitcoin

Retrieving the Public Key from a SSH Private Key

SSH private key as generated by ssh-keygen contains a public key part. How do I retrieve this public key from the private key?

ssh-keygen -y -f ~/.ssh/id_rsa > ~/.ssh/id_rsa.pub
Technology

SSH login without password using SSH public/private keys

SSH or Secure SHELL is the most popular and trusted UNIX-based cryptographic network protocol. It can be used for secure data communication, remote server logins, remote command execution, and many other secure network services between two networked servers. 408 more words

Unix

SEX REHAB INVENTED BY A MISOGYNIST by line Ashely Madison

Now that the cat is out of the bag…Let’s see a show of hands for all of us who are on the website ASHLEY MADISON. 912 more words

Adult Category

Create public/private key

To Generate your public/private keys

$ ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/home/rodnee/.ssh/id_rsa):
Enter passphrase (empty for no passphrase):
39 more words

Bash

Capalla v. Commissions on Elections, G.R. No. 201112, 13 June 2012.

During the oral arguments of the case in the Supreme Court, it was challenged that PCOS machines do not comply with the requirement of the law on automated elections that electronic transmissions must be digitally signed. 387 more words

Case Digests