Mini tutorial for configuring client-side SSL certificates.

Client-side SSL

For excessively paranoid client authentication.

Using self-signed certificate.

Create a Certificate Authority root (which represents this server)

Organization & Common Name: Some human identifier for this server CA.

openssl genrsa -des3 -out ca.key 4096
openssl req -new -x509 -days 365 -key ca.key -out ca.crt

Continue reading “Mini tutorial for configuring client-side SSL certificates.”

iluwatar/java-design-patterns: Design patterns implemented in Java

Design patterns are formalized best practices that the programmer can use to solve common problems when designing an application or system. Design patterns can speed up the development process by providing tested, proven development paradigms. Reusing design patterns helps to prevent subtle issues that can cause major problems, and it also improves code readability for coders and architects who are familiar with the patterns.

Source: iluwatar/java-design-patterns: Design patterns implemented in Java

Deeplearning4j: Open-source, distributed deep learning for the JVM

Deeplearning4j is the first commercial-grade, open-source, distributed deep-learning library written for Java and Scala. Integrated with Hadoop and Spark, DL4J is designed to be used in business environments, rather than as a research tool. Skymind is its commercial support arm.Deeplearning4j aims to be cutting-edge plug and play, more convention than configuration, which allows for fast prototyping for non-researchers. DL4J is customizable at scale. Released under the Apache 2.0 license, all derivatives of DL4J belong to their authors.By following the instructions on our Quick Start page, you can run your first examples of trained neural nets in minutes.

Source: Deeplearning4j: Open-source, distributed deep learning for the JVM

svchost.exe high memory usage – wuauserv

In my experience, when wuauserv starts eating memory, the best thing to do is to wait until it finishes installing the updates and then reboot.

If you can’t or aren’t willing to reboot now, you can always reset wuauserv with the following BAT script (right click & run as administrator):

net stop wuauserv
net stop bits
rd /s /q %windir%\softwaredistribution
net start bits
net start wuauserv
wuauclt.exe /detectnow

Hope it helps.

Source: svchost.exe high memory usage – wuauserv

Bypassing censorship by using obfsproxy and openVPN , SSH Tunnel | Container of Scribbles

Syrian ISPs are using sophisticated technologies to monitor and filter traffic. These boxes are DPI (Deep Packet Inspection) and what they do is sniff out every little packet flowing through them to find specific patterns and then they provide their administrator with the option to block traffic that matches these patterns. These boxes are very sophisticated and they don’t just filter traffic by src, dst or port, they filter traffic by the content the packets carry.

Continue reading “Bypassing censorship by using obfsproxy and openVPN , SSH Tunnel | Container of Scribbles”

Convert keys between GnuPG, OpenSsh and OpenSSL – Sysmic.org

OpenSSH to OpenSSL

OpenSSH private keys are directly understable by OpenSSL. You can test for example:

openssl rsa -in ~/.ssh/id_rsa -text
openssl dsa -in ~/.ssh/id_dsa -text

So, you can directly use it to create a certification request:

openssl req -new -key ~/.ssh/id_dsa -out myid.csr

You can also use your ssh key to create a sef-signed certificate:

openssl x509 -req -days 3650 -in myid.csr -signkey ~/.ssh/id_rsa -out myid.crt

Notice I have not found how to manipulate ssh public key with OpenSSL

Continue reading “Convert keys between GnuPG, OpenSsh and OpenSSL – Sysmic.org”