Cryptography
Exploring Low Tech Pen and Paper (hand) CryptographyFor the past 5 months I have been playing around with pen and paper low tech, old style cryptography, encoding for a few scavenger hunts, treasure hunt and escape room type games in the real world. I also made a kids game using these and the kids where extremely enthousiast, unfortunately, they where not able to finish it due to time constraints (we began the game too late into the party). As well as for the alternate reality game I’m working on.
7 Minutes
Oct 16, 2025
LastMod: Oct 16, 2025
1360 Words
For the past 5 months I have been playing around with pen and paper low tech, old style cryptography, encoding for a few scavenger hunts, treasure hunt and escape room type games in the real world. I also made a kids game using these and the kids where extremely enthousiast, unfortunately, they where not able to finish it due to time constraints (we began the game too late into the party). As well as for the alternate reality game I’m working on.
Exploring Low Tech Pen and Paper (hand) CryptographyFor the past 5 months I have been playing around with pen and paper low tech, old style cryptography, encoding for a few scavenger hunts, treasure hunt and escape room type games in the real world. I also made a kids game using these and the kids where extremely enthousiast, unfortunately, they where not able to finish it due to time constraints (we began the game too late into the party). As well as for the alternate reality game I’m working on.
7 Minutes
Oct 16, 2025
LastMod: Oct 16, 2025
1360 Words
For the past 5 months I have been playing around with pen and paper low tech, old style cryptography, encoding for a few scavenger hunts, treasure hunt and escape room type games in the real world. I also made a kids game using these and the kids where extremely enthousiast, unfortunately, they where not able to finish it due to time constraints (we began the game too late into the party). As well as for the alternate reality game I’m working on.
Synchronizing between devicesSynchronizing data, files between devices should not be a pain.
IN the past I used to do it via rsync, sshfs and other shenanigans
1 Minutes
Feb 6, 2025
LastMod: Feb 6, 2025
142 Words
Synchronizing data, files between devices should not be a pain. IN the past I used to do it via rsync, sshfs and other shenanigans
Convert images using the commandline (WEBP)The smaller an image is, the more disk space and bandwidth it can save. You can easily convert images to a more efficient form with the command line by using open source tools.
2 Minutes
Jan 23, 2025
LastMod: Jan 23, 2025
258 Words
The smaller an image is, the more disk space and bandwidth it can save. You can easily convert images to a more efficient form with the command line by using open source tools.
Best Blogging softwareThe majority of people use mainstream social media to share content.
On the other spectrum we have technical people on the indieweb and the old web who self host
their own servers/apps.
Most of us became developers due to the fact that we didn;t have the easy drag and drop systems of today. But this also means that the current systems fail to produce adequate developers.
3 Minutes
Jan 21, 2025
LastMod: Jan 21, 2025
487 Words
The majority of people use mainstream social media to share content. On the other spectrum we have technical people on the indieweb and the old web who self host their own servers/apps. Most of us became developers due to the fact that we didn;t have the easy drag and drop systems of today. But this also means that the current systems fail to produce adequate developers.
GoBlog and using MY website as the center of digital existenceI’ve relaunched my website with GoBlog
. Saying 👋🏻hello to all GoBlog users out there!
2 Minutes
Jan 15, 2025
LastMod: Jan 15, 2025
422 Words
I’ve relaunched my website with GoBlog . Saying 👋🏻hello to all GoBlog users out there!
The BotnetA botnet is a growing network of Internet-connected malicious devices (computers, laptops, tablets, routers and mobile phones), which have been infected with “malware” which act as bots. Botnets can be used to perform distributed denial-of-service attacks, steal data, send spam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control software. The word “botnet” is a portmanteau of the words “robot” and “network”. The term is usually used with a negative or malicious connotation
3 Minutes
Jan 6, 2025
LastMod: Jan 6, 2025
488 Words
A botnet is a growing network of Internet-connected malicious devices (computers, laptops, tablets, routers and mobile phones), which have been infected with “malware” which act as bots. Botnets can be used to perform distributed denial-of-service attacks, steal data, send spam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control software. The word “botnet” is a portmanteau of the words “robot” and “network”. The term is usually used with a negative or malicious connotation
Block Crawler BotsNOTE: This article is still work in progress as I haven’t had the time to experiment with a few ideas to see which one works best.
6 Minutes
Jan 3, 2025
LastMod: Jan 3, 2025
1199 Words
NOTE: This article is still work in progress as I haven’t had the time to experiment with a few ideas to see which one works best.
Blockchain and Cryptography made simple for Businesses signature for documents and imagesA glimpse of using modern technology to provide adequate solutions to
business needs. The document signature system was built with blockchain technology.
It provides the ability to upload documents, get them signed
cryptographically and have them verified within the system for
integrity.
1 Minutes
Apr 10, 2023
LastMod: Apr 10, 2023
193 Words
A glimpse of using modern technology to provide adequate solutions to business needs. The document signature system was built with blockchain technology. It provides the ability to upload documents, get them signed cryptographically and have them verified within the system for integrity.