Category: Skills
-
The Weekly Feast – Chicken with Creamed Corn
I’m not a huge creamed corn fan, but wow, this was delicious! It was a bright, sunny looking meal on a miserable, chill evening. The sweetness of the corn complimented the savory chicken, and the entire dish came together in under an hour. I hope you enjoy! Ingredients: 2 lbs chicken breasts, cut into strips…
-
One Step Forward, ??? Steps Back
Networking used to be simple. It is unclear to me why I think that. Maybe because when I started all of this, it was simple. Networks are broken down into two major classes, Point-to-Point (P2P) or broadcast. When you transmit on a P2P port, the data goes to a dedicated port on the other side…
-
Prepping – Let There Be Light
Light is a topic that’s come up a few times in my prepper discussions, and so I thought it deserved its own article. Light is defined as “…something that makes vision possible.” (Merriam Webster) We call the light part of our day, aptly enough, daytime. We can see to study, to teach, to learn, and…
-
The Weekly Feast – Curried Squash and Pear Soup
I love this soup, and it can be made with just the squash, or with the pears as well. I think the sweetness of the pears really adds a depth to the soup that the squash alone doesn’t have. If you want to impress your family, serve this in a hollowed out large squash (such…
-
Bad Hardware Design
I have had good luck with picking up discarded computers, upgrading them, and making them functional members of the computer or services farm. A computer consists of persistent storage (disk drives and SSD), dynamic storage (memory), a processor (CPU), and I/O devices. Data is read from disk into memory, the processor then either executes it…
-
Finding A Teacher
A few weeks ago, I went up to the Fort at #4 to use their warping board. I have a warping board, I just do not know where it is. I could make a warping board, I didn’t want to spend the time to do so. On the way up, I stopped to pick up…
-
Prepping – Travel
There are two main options, should the shit actually ever hit the fan: bugging in, or bugging out. Yes, there are variations to both of those, but that’s essentially your two choices in their most basic form. I’ve talked about bugging in a bit, and about hiding in forests and building shelters and such. But…
-
Two Factor Authentication
There are two parts to access control, the first is authentication, the second is authorization. Authentication is the process of proving you are who you claim to be. There are three ways to prove you are who you say you are, something you know, something you have, or something about you. When you hand your…
-
Data Security
Data security is the protection of your data throughout its lifecycle. Let’s pretend you have a naughty image of yourself that you don’t want anybody else to see. The most secure way of protecting that image is to have never taken that image in the first place. It is too late now. If you put…
-
Network Nerding
You might have heard the phrase, “He’s forgotten more than you will ever know.” When dealing with somebody who is quietly competent, that is almost always the case. I was there at the start of the Internet. I watched our campus get X.25 networking. Later, BITNET. I watched email get dumped into the UUCP queues…