Calendar RFC’s

Posted by Benjamin Close on November 13, 2008 under Computers | Be the First to Comment

CAP Related rfc2445.txt – Internet Calendaring and Scheduling Core Object Specification (ICalendar) rfc2446.txt – iCalendar Transport-Independant Interoperability Protocol (iTIP) rfc2447.txt – iCalendar Message-Based Interoperability Protocol (iMIP) rfc2739.txt – Calendar Attributed for vCard and LDAP rfc3080.txt – The Blocks Extensible Exchange Protocol Core (BEEP) rfc3081.txt – Mapping the BEEP Core onto TCP rfc3283.txt – Guide to [..more..]

Carly Close

Posted by Benjamin Close on under Life | Read the First Comment

Carly Close

Carly and Ben met in December of 2000, a surprize date by their best friends Patrick and Anita. Over time they became friends, lovers and on the 10th of April 2004 Ben asked Carly to be his wife. Carly Agreed! So on the 23rd of April 2005 they became one. Carly is the love of [..more..]

BGmailFS

Posted by Benjamin Close on under Projects | Read the First Comment

bgmailfs

This page documents a concept that was discussed between a number of members of the Wearable Computer Lab. As such we’ve not investigated whether the concept is in violation of the gmail usage terms and conditions. Hence please consider below nothing but an idea for now. If you have questions about this or would like [..more..]

MPX & XTst

Posted by Benjamin Close on under Computers, FreeDesktop, OpenSource | Be the First to Comment

MPX is a modification of the Xorg X Windowing system created by Peter Hutterer whilst doing his PHD in the Wearable Computer Lab, at the University of South Australia. It allows independent device control and contains a number of different API enhancements to support these. You can find more about MPX at: http://wearables.unisa.edu.au/mpx/ Some of [..more..]

Proxying a page/website through Apache

Posted by Benjamin Close on November 8, 2008 under Computers, OpenSource | Be the First to Comment

Sometimes you want to expose one port in your firewall but not another. However, often you have different servers running on different ports. Apache has the ability to proxy pages, this allows one server to be externally visible with the other running only locally. It allows you to secure one server and only open one [..more..]

Removing .htaccess Authentication Restrictions

Posted by Benjamin Close on under Computers, OpenSource | Read the First Comment

Removing .htaccess Authentication Restrictions Have you ever found yourself needing to remove authentication from part of a website? This actually happens fairly regularly. The way you do it is as follows: .htaccess AuthType none Satisfy Any The AuthType none directive indicates apache should not prompt for a password, whilst the Satisfy Any directive tells apache [..more..]

OPIE – One Time Keys

Posted by Benjamin Close on under Other | Read the First Comment

Using External SSH access with normal password authentication is dangerous. It is susceptible to the following problems: People can use weak passwords which are easy to hack A remote machine may have a key logger on it Someone may be performing a man-in-the-middle type attack Hence if you wish to access a shell account or [..more..]

iwn

Posted by Benjamin Close on under FreeBSD, wireless | 7 Comments to Read

Last Updated: 20080521054508 This page documents the current state of the IWN driver for FreeBSD, the driver supports the Intel 4965AGN Wireless Card, often found in Intel Centrino based laptops. If your looking for the driver for the 3945 chipset check out the wpi page. Note: A majorly updated version of the iwn driver has [..more..]

Setting up SSH Public/Private Keys

Posted by Benjamin Close on November 7, 2008 under Computers, OpenSource | Be the First to Comment

Using SSH for Automatic Key authentication SSH provides an encrypted tunnel for use with interactive and non interactive terminal sessions. It provides authentication via a number of methods including password, public/private key pairs and challenge keys. SSH also provides authentication forwarding between machines. This feature allows a user to be able to log on to [..more..]

gdb

Posted by admin on under Computers, Programming | Read the First Comment

Helpful hints for when using GDB