Posts

How To Use SSH Private Keys In Filezilla

A little unknown ability in Filezilla FTP client is the fact you can use private keys to connect to remote servers without a password. While in the site manager where you add and remove sites to connect to there is no option to provide a private key, it is actually somewhere else. Go to the menu bar along the top: Click edit and then settings. A settings popup box should appear now with a whole heap of different options to select, but we are going to be clicking “SFTP” – you should now see some text mentioning public key authentication. This is where we will load our key.

More iPhone 6 Design Flaws: Bending Phones

After not long posting about the weaknesses in the iPhone 6 and iPhone 6 plus screen glass, reports of iPhone 6 Plus phones bending after being in your pockets have been emerging. The weakness appears to be due to the fact the cut-outs for the volume buttons weaken the aluminium enclosure when pressure is applied. A Youtube tech blogger Lewis Hilsenteger bent the iPhone 6 Plus on camera and while he did need to apply pressure, the phone did indeed bend.

Paragon NTFS For Mac: Definitely Worth Buying

By default Mac OS (Mavericks for me) doesn’t ship with pre-configured support for reading and writing to NTFS drives. You can read them, but you can’t write to them. As I previously wrote in a post, you can enable NTFS write support in Mac OS Mavericks and up, but it involves a few steps and is more of a hack. This is where Paragon NTFS for Mac comes into the fold.

The Most Common iPhone Passcodes (and how to guess them)

Apple’s much touted new feature in iOS 8 is the inability for lawful law enforcement requests to unlock their phone without the passcode. In previous versions of iOS, law enforcement officials could obtain a phone and send it to Apple to get it unlocked, because of a change in how phones are encrypted, Apple can no longer do this. But there is another way for law enforcement and attackers to still get in: guessing the passcode. To contrary belief, most passcodes are easily guessable for law enforcement or an attacker as people generally only use a small subset of criteria for their passcodes.

How To Secure Your Server With SSH Public/Private Keys

In this day and age you can never be too careful, this is why ensuring that any interaction you have with your remote servers is done using public and private keys via ssh. I have seen countless times people administering their servers using the root login with a weak password instead of public/private keys. Important note Your private key file should be kept safe. Under no circumstance should you ever give it out. The private key is the equivalent of the lock and the public key is the equivalent of a key to open that lock. Your generated keys should also be protected by a strong passphrase.

How To Download Your Paid Udemy Course Videos

I am a big fan of Udemy and I have purchased about 13 courses off of the site (and counting) but sometimes I don’t have access to the internet on my laptop and watching videos (especially programming videos) on my Android phone which have been synced offline and being able to follow along isn’t easy or ideal. I have found a clever and simple Python script that allows you to download your paid Udemy course videos so you can watch them on your Mac or PC offline without needing any kind of internet connection (except for the initial download).

How To Decompile And Compile Android APK's On A Mac Using Apktool

Most instructions around on the web for decompiling and compiling Android APK files are for Windows PC users, but what about Mac users who have a native command line yo? The steps are pretty much the same, except you need to do one more thing. Requirements – A Mac – An internet connection – Java SDK and JRE – Android SDK – Apktool Step 1 – Install Java SDK and JRE You can download Java from this link. The Apktool will mostly use the SDK libraries, but JRE will be required for some tasks, so we install both just in case.

Why Database Administration Is So Hard

When it comes to software and web applications, nobody does it tougher than database administrators. You generally only see DBA’s in their mid thirties because database administration is a highly specialised position that requires a breadth of knowledge across multiple spectrums of databases and to an extent, servers. What skills a database administrator should have Ideally a database administrator and in most cases this rings true, started off as a developer and then specialisation in database administration.

Does The iPhone 6 and 6 Plus Have A Design Flaw With Overly Weak Screens?

More cracked screens than a crack den full of Apple loving hipsters. It hasn’t even been out that long and already, stories and images are emerging of countless iPhone 6’s breaking after being dropped just once. Not known for their ability to survive a drop from waist distance, the iPhone 6 appears to be shaping up as the most vulnerable of all iPhone models released so far. During testing of the iPhone 6 for a review, Walt Mossberg actually dropped his iPhone 6 review phone and it broke the screen. While it continued to work, the glass was cracked. A scenario iPhone 4 and iPhone 5 users will be more than aware of.