Archives for Software Dev - Page 7
So you think you understand how bitcoin works?
sample bitcoin wallet address Also read - The physics of Gold and Bitcoin Why can you not copy your file - and have DOUBLE your money now? If miners are…
Web Server Considerations for Hosting SSL Certificates
(Also read - SSL Certificate basics ) Ensure that your server is at least dual homed. Use a separate Network Interface for the Web Server (and associated SSL certificate). Use…
Sangria Recipe
After a few trials, this is the recipe I settled on. The Wine I used to just use ANY sweetish red wine, but that turned out to be incorrect. To…
RSA public and private key lengths
The Modulus defines the length An RSA key length is the length, in bits, of the modulus. An RSA key that has length "2048", is generated from a modulus that…
No Property Manager Required – Zillow Rental Manager App (and website)
I actually did not see this coming. The entire process of placing your property for lease (rent) , managing applicants (including background checks - more on that down below) and…
Secrecy versus Privacy in RSA based Schemes
RSA is a scheme that can be used for two purposes. Secrecy - Encrypting in transit data - Data Encryption. This is the basis for all certificate based data encryption…
The framework microsoft.aspnetcore.app version 3.1.0 was not found
If you see this error in VS Code, you are missing the aspnetcore runtime (even though you may have installed the larger .net core runtime). Basically, .net core is not…
SSL and TLS Certificate Basics
What IS a Certificate? (Also read, Web Server Considerations for Hosting SSL Certificates ) It is a mapping of an entity name (organization or individual) to a PUBLIC KEY. How…
Kerberos versus SSL
Kerberos does not require a session. The TGT (Ticket Granting Ticket) system allows for a session less protocol SSL of course, does establish a session before sending any data. …