Quantcast
Channel: Andrea Corbellini » ubuntu
Browsing latest articles
Browse All 10 View Live

Image may be NSFW.
Clik here to view.

New blog, again

This must be the third blog I start from scratch. But this time, I’m taking a serious commitment: I’m going to write here regularly. Wish me luck!

View Article



Image may be NSFW.
Clik here to view.

Prime numbers and universe factories

I’m a XKCD fan, and I look it up regularly. There’s a comic that I particularly enjoyed: Pi Equals. The comic Pi Equals, from XKCD.com (CC-BY-NC 2.5). Well, it appears that Randall was right in that...

View Article

Image may be NSFW.
Clik here to view.

Are LXC and Docker secure?

Since its initial release in 2008, LXC has become widespread among servers. Today, it is becoming the preferred deployment strategy in many contexts, also thanks to Docker and, more recently, LXD. LXC...

View Article

Image may be NSFW.
Clik here to view.

Running Ubuntu Snappy inside Docker

Many of you may have already heard of Ubuntu Core. For those who haven’t, it’s a minimal Ubuntu version, running only a few essential services and ships with a new package manager (snappy) that...

View Article

Image may be NSFW.
Clik here to view.

Let’s Encrypt: the road towards a better web?

I’ve always dreamed of a encrypted web, where HTTPS is the standard and plain HTTP is no more. A web where eavesdropping or manipulating information is not possible, or at least much harder than today....

View Article


Image may be NSFW.
Clik here to view.

Elliptic Curve Cryptography: a gentle introduction

Those of you who know what public-key cryptography is may have already heard of ECC, ECDH or ECDSA. The first is an acronym for Elliptic Curve Cryptography, the others are names for algorithms based on...

View Article

Image may be NSFW.
Clik here to view.

Elliptic Curve Cryptography: finite fields and discrete logarithms

This post is the second in the series ECC: a gentle introduction. In the previous post, we have seen how elliptic curves over the real numbers can be used to define a group. Specifically, we have...

View Article

Image may be NSFW.
Clik here to view.

Elliptic Curve Cryptography: ECDH and ECDSA

This post is the third in the series ECC: a gentle introduction. In the previous posts, we have seen what an elliptic curve is and we have defined a group law in order to do some math with the points...

View Article


Image may be NSFW.
Clik here to view.

Elliptic Curve Cryptography: breaking security and a comparison with RSA

This post is the fourth and last in the series ECC: a gentle introduction. In the last post we have seen two algorithms, ECDH and ECDSA, and we have seen how the discrete logarithm problem for elliptic...

View Article


Image may be NSFW.
Clik here to view.

Let’s Encrypt is going to start soon

Let’s Encrypt (the free, automated and open certificate authority) has just announced its launch schedule. According to it, certificates will be released to the public starting from the week of...

View Article
Browsing latest articles
Browse All 10 View Live




Latest Images