Saturday, June 22, 2013

Python templating..

So recently, I was working on a home project, where I needed to generate some configuration files. So I turned to a templating solution I've used before, Python and Cheetah

The configuration files I'm generating happen to use $ quite a bit, which is also one of the keyword tokens for Cheetah. I needed to override that token. Cheetah supports this, you can pass in a settings variable that lets you configure that token. It works. Except for one minor thing. The configuration file also happen to have lines that contained only a #. For some reason, Cheetah would remove this line in the output. Normally, that character is used for some compiler directive stuff, and I overrode that. But not matter what I did, it still removed that line.

So I started investigating other Python templating engines. It seems most of them assume that you only need templating for HTML. *sigh*. Eventually, I found Jinja. Instead of using $ for everything, it uses {{ }}. Which solves my dilemma. 

Friday, June 21, 2013

New bumper stickers!

I just created some new bumper stickers. 


You can order them here.

Thursday, June 20, 2013

In light of recent events..

In light of recent events, I've stopped my series of password articles. Mostly because ArsTechnica posted an article more or less going through the same things I wanted to cover. You can find the article here. It goes into not only how passwords are formed, but also how to crack them.

Also, we've had the NSA spying 'scandal', which many of us have known about, or highly suspected for years. The general consensus is that what the NSA is doing isn't some magical top secret program. Its probably using off the shelf components, that anyone with enough money can buy, and using it to collect data. I doubt they are storing everything that crosses the internet. The media seems to imply that, but I doubt it.

What they are doing through is storing who connects to who. Not the data itself, but  information about the data, called meta-data.  We don't really care about the data itself. For example, lets say that Amy calls Bob, over a cell phone. Right way, we know several things. Amy called Bob, establishing a relationship. They used a cell phone. As we dig further, we know where Amy was when she made the phone call, and if she was moving. We know how long Amy and Bob conversed. We also know where Bob was, and if he was moving. 

This is quite a bit of information that can be used to track movement, establish "social graphs", and other forms of data analysis. Even without knowing what the data is, they can infer what the may be. 

There are way you can protect yourself. Things like VPNs, proxies, and Tor. By keep in mind, those types of things will slow your internet connection, turning your fast broadband connection to a very slow dialup modem. That may be the price of "freedom".