According to my page revision history, 9 months ago I started writing a guide on using Cloudflare as a free CND for websites. I’m sure I’ll finish that eventually, but for now here is why I think it is so great. Free load balancing!
If you are reading this, then you must be using the new URL for my website.
I moved from procrastinatingengineer.co.uk to procrastinatingengineer.uk
Mostly because it’s shorter and I think it looks nicer, but also I wanted to play around with self hosted WordPress and CND setups. More on this coming soon!
TL;DR – Yes, yes it is. But Japan is better!
Troy Hunt has updated the haveibeenpwned list of pwned passwords, which now contains a staggering 501 million compromise passwords (as SHA1 hashes). It now also includes a count of how many time that password has been found, so you can see just how poor your password choices are!
I wrote a post in February called Linux Server Pulling Sextuple Duty, describing all the things I use a Linux server for. I said that I would write a guide on how to set it up, since I was always breaking things and needed a guide myself. I have now broken my server so many times that I am pretty good at getting a new one going again. So here is
part one of my setup guide s. Continue reading “Linux Server Setup”
GitHub is a great place for anyone doing software development. If there is anything you are trying to do that anyone else might have thought about doing at some point in the past, it probably exists on GitHub.
Have you been pwned? Troy Hunt, a security researcher at Microsoft has set up a great project called “haveibeenpwned” so you can find out. You can use the website to search for an e-mail address and see if they have been included in past data breaches. You can also sign up to be notified of future breaches too. If your e-mail has been found, it will tells you what data has been leaked, such as poorly hashed passwords. My results (for my generic sign-up email) are below. The Adobe and LastFM password leaks are a serious concern since MD5 is no longer considered a secure hashing algorithm. Oops. Continue reading “Have You Been Pwned?”