Posts

  • Hacking Your Own Data Ubuntu Chrome

    Hacking is scary to most people, but I think people should be aware how much of their data is accessible and easily accessible. Storing your passwords is dangerous. ...

  • P2p Distributed Compute Power

    The uprise of P2P, now also as a digital currency in Bitcoin and other crypto currencies, led me to an interesting idea. A while back I was thinking about a P2P distributed VM system that could act as a shared compute cloud between peers, however, until now I dismissed it as too complex to implement. But maybe it’s not! ...

  • Apache Virtual Host Home Directory

    Apache configuration is not always easy. So, this post is dedicated to Apache the VirtualHost Directive. For now I will keep it simple and just show you how to set up a VirtualHost in your home directory since that has changed with the new version and it is not obvious what you need to do. ...

  • Jekyll Installation

    Jekyll is the software I’m using for this blog. So, just as a reminder for myself and people who want to try it out, I thought I would document here, how to install it. ...

  • Howto Make Money With Open Source

    Bounty Source

    Open Source is great. You can use high quality software that you can trust and all that for free. However, Open Source developers have to live as well. So, I was researching how one can make money by improving Open Source Software. Turns out, there are ways to do that. ...

subscribe via RSS