LaTeX makefile
[caption id="" align="alignright" width="350"] Document writing without makefile (Photo credit: Wikipedia)[/caption]
As many people writing using efficient tools, I use [latex]LaTeX[/latex]. I divide my work in chapters, each chapter being written in separate .tex file[1. as explained in wikibooks]. I need an efficient way …
Read More
reflexion and amplification attacks
Reflection attacks are well known. To explain them, I won’t use Bob and
Alice because they are
needed in another protocol description .
Let’s use French femal names.Let’s say
Gertrude
wants to attack
Thérèse
. Gertrude knows that
Henriette ‘s computer is
online …
Read More
CC-BY-SA icons
When making some drawing to explain anything you want to explain, you
face oneproblem: how to get usable drawing sheet (computer, routers,
…)
Of course,
Dia embed some
(including cisco one), some
MS
software too.
The alternative I use is the icons included in
Gnome and KDE …
Read More
chroot pre/post requests
[caption id="" align="alignright" width="350"] changed roots (Photo credit: Wikipedia)[/caption]
The chroot command is quite simple but I almost always forget all the prerequest and post-chroot checks that should be done to have a fully operational chrooted environment.
The, chroot operation consist in changing the apparent root of …
Read More
Morning trouble
In the
finance
industry , we are
often subject to money manipulation and actions mixing politics,
treason and money exchange.
Here is one of the latest stories I heard about. And opened questions
about it.
Our hero, that we will call John for the rest of this article, has
entered a …
Read More
big cloud data
[caption id="" align="alignright" width="350"] Big cloud not computing (Photo credit: Wikipedia)[/caption]
This post should be untitled From cloud computing to big data to fast data.
The previously next big stuff: cloud
computing
[caption id="" align="alignright" width="75"] Cloud computing (Photo credit: Wikipedia)[/caption]
Once upon a …
Read More
MUA: n-to-one relationship
Keymaker (Photo credit: S n o R k e l)
The problem I face is the following: I have multiple mail addresses (as many people, it helps compartimenting), multiples
MUA (not as many people, but as I'm a bit paranoiac, I would like to change software easily).
Here is a …
Read More
[R R R R R R R R R R R R R R R]
[caption id="" align="alignright" width="350"] Spools of thread (Photo credit: Wikipedia)[/caption]
I wanted to use multithreading in R. I'm used to C pthread mechanism, but I want to use some R functions. This functions run independently on separate data, and treatments can take some time.
In short, what …
Read More
Puzzle
The question is: what is a puzzle? The answer I prefer is: a riddle
whose solution is hard to find but easy to verify. In computer science,
it’s used to provide
proof-of-work
and usually implemented through cryptographic mechanisms. I found
versions of cryptographic …
Read More
Music reflection: timeline and publications
[caption id="" align="alignright" width="350"] sound research material (Photo credit: Wikipedia)[/caption]
I just discover google music timeline. That leads me to several publications from google about music.
I wonder why does google work on music. Google is a commercial company whose business model is based on ads and …
Read More