Netscape Turns 30 by Adam Shand
Bootcamp, Svelte and a New Website by Adam Shand
Automatically create SSHFP records on Cloudflare DNS by Adam Shand
Howto to Encrypt Selected Files in a Git Repository by Adam Shand
Escaping the Big Apple? by Adam Shand
Simple Email Encryption on the Mac by Adam Shand
Managing Wrist Pain by Adam Shand
Introduction to Distributed Version Control Systems by Adam Shand
Little Brother by Cory Doctorow by Adam Shand
Processing CSVs on the Command Line by Adam Shand
Baa Camp 2009 by Adam Shand
Selecting Java Version on Mac OSX Leopard by Adam Shand
Getting SpamAssassin to Trust Authenticated SMTP Clients by Adam Shand
How to Repair the Cisco VPN Client by Adam Shand
SSH Tricks by Adam Shand
Baa Camp 2008 by Adam Shand
iPhoto Now Supports IPTC Metadata by Adam Shand
The Easy Way To Generate OpenSSL CSRs with subjectAltNames by Adam Shand
Introduction to SQLite by Adam Shand
Accelerando by Charles Stross by Adam Shand
Wireless Networking in the Developing World by Adam Shand
Glenn Fleishman on Community Wireless by Adam Shand
Lightning Talk at Linux Conference Australia by Adam Shand
Apache Tips and Tricks by Adam Shand
Integrating Apple OSX Clients with an OpenLDAP Directory by Adam Shand
Le Parkour by Adam Shand
Wiki to Blog and Back Again by Adam Shand
Integrating Active Directory With Apache by Adam Shand
Time Travel Spam by Robby Todino Jr.
Lobsters by Charlie Stross
Talking to TCP Services by Adam Shand
Frontpage suEXEC Hack by Adam Shand
Frontpage Server Extensions by Adam Shand
Secrets of the Little Blue Box by Ron Rosenbaum
The easier it is for you to access your data, the easier it is for someone else to access your data.
Data doesn't really exist unless you have at least two copies of it.
Never put data into a program unless you can see exactly how to get it out.
Ship feature; Tweet; Send newsletter. Do this 50 times, and I’m pretty sure you’ll have a viable indie business. Doesn’t need to be more complicated…
I have this strongly held opinion that "details matter". If you get the details right, the rest will follow.
The question of whether a computer can think is no more interesting than the question of whether a submarine can swim.
Stan runs his network like a fascist police state that crushes the spirit of TCP/IP packets. Stan often finds himself locked out of or inside of his network during one of many revolts of the oppressed packets. Stan uses OpenBSD PF.
Noah's network is run like a Hippie commune of free-love, drum circles and consciousness raising drugs. On occasion some packets wander out and reach their destination. Sometimes they send back postcards with poems written on the back. Sometimes gangs of biker packets roar up and steal all the good drugs. But there is no hate in Noah's network because all packets are created equal and sometimes bad packets are just ones we haven't made love to yet. Noah uses Linux iptables.