Vergütungsmodelle für Medieninhalte
Fassung vom 30.04.2010 PDFODTMotivation Internet – Fluch oder Segen für die Medienindustrie? Die Diskussion um die Vergütung von Medieninhalten im Internet ist geprägt durch eine starke Polarisierung....
View ArticleSecuring Lighttpd
This is a set of configuration settings you might want to use to secure your Lighttpd webserver configuration. Continue reading "Securing Lighttpd"
View ArticleAlways up SSH SOCKS Proxy on Windows
For additional security, I use SSH tunneling to one of my servers and dynamic port forwarding for some of my applications. This post explains how to use Putty to have a tunnel/SOCKS proxy that is...
View ArticleWebDAV, Windows 7 and Self-Signed Certificates Howto
WebDAV is a nice protocol. Unfortunately, the Windows implementations of it are amongst the crappiest pieces of software ever written. I thought it was better on Windows 7, but it still sucks. Here's...
View ArticleMeine Einreichung fürs Camp 2011: Ihr kotzt mich alle an.
QUOTE:Please submit your talks for the Chaos Communication #Camp – Submission are due May 1st, 2011. https://cccv.pentabarf.org/submission Ich hab ja keine Ahnung, aber ich hab trotzdem mal was...
View ArticleOpen Data und Zwangsversteigerungen
Eine große Anzahl an Amtsgerichten veröffentlichen die Termine für Zwangsversteigerungen von Immobilien auf www.zvg-portal.de. Ich hätte die Daten gerne im Rohformat, und habe eine diesbezügliche...
View ArticleFree Seedbombs for CCCamp
I will bring free seedbombs to the CCC Camp this year. Continue reading "Free Seedbombs for CCCamp"
View ArticleErstes interessantes Wikileaks-Buch?
Über die Anti-B-Mailingliste liefen ein paar Zitate aus dem Buch Julian Assange -Die Zerstörung von WikiLeaks? Anonymous... Info-Piraten versus Scientology, Pentagon und Finanzmafia von Gerd G. Rueger....
View ArticleCraig asks: How will you change the World in 2012?
Craig from Craigslist is conducting a little experiment among readers of his new website Craigconnects: How Will You Change the World in 2012? I am submitting my trip across Europe.Continue reading...
View ArticleSo, what about Cybercrime in Switzerland?
Yesterday, I joined some people from Chaos Computer Club Zürich (CCCZH) to visit the Cybercrime Coordination Unit (KOBIK) in Bern. The background was a Freedom of Information Act based request by the...
View ArticleUbuntu is Tracking You: Disable connections to Canonical
Ubuntu not only connects to Canonical servers on request, it does so permanently in the background. It even transmits geolocation information for the weather applet. Here's a quick fix that removes...
View ArticleUnlisted Mailinator Alias
Mailinator is one of the most widely known and used disposable email providers. Any mail you send to whatever@mailinator.com can be read publicly on their website. Unfortunately, many websites block...
View ArticleLinux: Automatically shredding files before deletion
I am currently playing with the thought of shredding files automatically before they are unlinked from the file system (for example on a mail server). I wrote a small library that you can inject into...
View ArticleLinux: Anonymize IP logs with syslog-ng
By using a replacement for the default system logger, syslog-ng, you can selectively stop IPs from being written to log files, for example on a mail server. Continue reading "Linux: Anonymize IP logs...
View ArticleYour Code Will Survive You
I just rediscovered a website I have written less than ten years ago. It had its own domain. I did not even remember that I ever had this website. On top of that, it contained two utilities that I...
View Article
More Pages to Explore .....