Creating Long Term SSL Certificates

"It's constantly fascinating for me that something that feels absolutely right one year, 12 months later feels like the wrong thing to do." --Damian LewisOften I find myself having to create my own SSL certificates. Be it an internal web-server, or two scripts that need to communicate to each other, ... Read More
Solving Problems with Unknown Constraints

Solving Problems with Unknown Constraints

/
"Software constraints are only confining if you use them for what they're intended to be used for" -- David Byrne (Of the Talking Heads)I recently had an ongoing conversation that spanned several days about the subject of solving mazes. A friend casually mentioned the "Same Wall Rule", (also known as ... Read More
Evaluating the Value of the (@)Purge Rule

Evaluating the Value of the (@)Purge Rule

/
“Only sometimes when we pick and choose among the rules we discover later that we have set aside something precious in the process.” ― Helen Simonson, Major Pettigrew's Last StandBackground and Problem Statement:I was recently asked the following question: "Is there any value in supporting the character purge rule in ... Read More
Cracking the MySpace List - First Impressions

Cracking the MySpace List – First Impressions

/
Alt Title: An Embarrassment of RichesBackstory:Sometime around 2008, a hacker or disgruntled employee managed to break into MySpace and steal all the usernames, e-mails, and passwords from the social networking site. This included information covering more than 360 million accounts. Who knows what else they stole or did, but for ... Read More