February 3, 2019

Kubernetes dashboard basic auth

Kubernetes provides us with a proxy without TLS support or HTTP Basic authentication (BA). Using IP filtering (--accept-hosts) did not work on my VPS either. In this post I’ll show how you can access your dashboard with TLS and basic auth. This post can also be used to get your first k8s running on your Ubuntu machine/VPS. Get your cluster The following steps are based on this tutorial. You should have Ubuntu 16 or higher: Read more

January 28, 2019

Lightweight open source ERP

When developing software, teams often use an Agile process. Usually using a product backlog, providing a clear overview of the desired features. For my personal projects (which usually involve code) and other tasks in life, I did not keep to such a structure and was looking for an unified overview. The various notes; written, Google keep, in the README of the project etc. are not efficient enough. What I need is a good project management tool, to enhance productivity and create an overview. Read more

January 17, 2019

As a Developer and DevOps you can work on a chromebook

My technical colleagues never got why I wanted to work on a chromebook, they said, why limit yourself when it isn’t needed? People get it when I’m always in search for the hottest peppers or like to have muscle fatigue after exercise, but not when working with less specs. Initial setup Almost everything that I do, can be done in a browser or on a CLI (i.e. on my Linux VPS over SSH). Read more

January 14, 2019

cheatsheet DIY home automation

This cheatsheet shows the steps to a DIY project and was used to make my heater smart. This guide is only readable to technical people. In the past I worked with primitive setups like Arduino or tried to get an ESP8266 wifi relay working. In my opinion, too limited and only worth considering if you need analog or economies of scale. Therefor, all my DIY home automation have a Linux kernel. Read more

January 10, 2019

The SCARV data backup strategy

We all have data we value, but do we value our data? Do we organize, version control and backup our data? This overview is targeted at home users, not enterprise or governments, which require multiple access groups and clearances. Approach Before we start and make all our data redundant, we need to have everything organized. We want our data to be; easy to file easy to find clear naming conventions; e. Read more

September 15, 2018

Avoid wealth tax over cryptocurrency through smart contracts

Smart contracts enable us to do gambling with a fixed set of participants and choose our own risk probabilities. These participants could be wallets belonging to one and the same person. This will allow us to store the value inside the smart contract from December to Januari and legally have no value over that time period. This may seem scam. If you involve your spouse’s wallets, it is not a single person anymore, therefore not a scam. Read more

October 11, 2017

SAM Scientific Argumentation Model of Bitcoin

SAM of bitcoin.org/bitcoin.pdf We first present the different parts, before constructing the graphical representation of SAM (Scientific Argumentation Model) (based on sheets 21-23 ). Introduction Motive Why was the research done “A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution.” “no mechanism exists to make payments over a communications channel without a trusted party. Read more

May 4, 2017

Auto clicker

This tool has helped a colleague find his partner for life on a dating site. This post is a little shady. To get students excited for creating software, i.e. a creative art, we can give them creative assignments. Aim This post shows how to automate the pressing of a button on a website. Why? Tinder just announced they’re going live with a web version. By showing students a case where they can ‘cheat’, could get them excited for more coding. Read more

March 17, 2016

So you want to become a hacker?

First lets get one thing straight. You have two groups, the angels and the daemons, white hat and black hat, hackers and crackers. Keep in mind, that the angels, the guys who find security holes and report them (what a sweet angel) are sometimes perceived as a daemon! The world is full of digital users, but the majority of people are ignorant fools when it comes to cyber security. For this reason, never call yourself a hacker, but a “Security researcher” or “Pen tester” (google it). Read more

December 22, 2015

The android phone for an iOS user

This is an old post, nowadays I would recommend android.com/one We all know it, our phone is crappy and we want to upgrade it. For a lot of people this means a new iPhone, which I totally get, since the Android landscape is overwhelming. Of course BlackBerry and WindowsPhone are options, but since they have so little market share, you miss out on the good apps. TL;DR Buy a stock Android device, preferably a Nexus, or just get an iPhone. Read more

Blog by lent.ink