I started this project when I was 19. I remember sitting on the lawn at Carroll College in Helena, Montana, and starting that first stitch up in the top left corner in DMC 420. The Lady of Shalott is a…
Category: Uncategorized
PKI — public key infrastructure, explained
(originally posted https://tisiphone.net/2018/03/07/the-infosec-amnesty-qa/ with thanks to Lesley “Hacks4Pancakes” Carhart) Here’s why I know about this My tech journey started in academia, where I spent my time writing math in Java. As I transitioned more and more to tech, I ended…
How much should startups spend on information security
When you have little to no budget, how do you start spending on information security in a startup to protect customer data and operations? I was asked to comment on this via email by Zack Whittaker for a story he was doing…
Yes, there was a hidden epic cryptographic puzzle story inside my book, “Women In Tech.”
And the champions just received their solid silver medals for solving the series. EDIT: the writeup in Techdirt by Mike Masnick was lovely. Five Years Later, Team Solves Puzzles In Women In Tech Book I wrote a book called Women…
Your private ssh keys do not copy over with a sudo dolphin! You must use bash in Kubuntu.
I’m glad I keep good backups. When backing up your Kubuntu box, do not just drag and drop one home folder from a hard disk to another hard disk. Your ssh keys will not be copied over, even though you…
An update to the bash script that takes a parameter:
#!/bin/bash book=$1 [[ -z $book ]] && { echo “No argument supplied, exiting!”; exit 1; } [[ ! -e $book ]] && { echo “Can’t find a file with the name $book, exiting”; exit 1; } title=${book%.*} bookcounter=0 linecounter=0 sed…


