@electronic{stackoverflow.com, title = {ssl - Setting mTLS connection to Kafka in Spring with a dynamically loaded certificate - Stack Overflow}, url = {https://stackoverflow.com/questions/77404276/setting-mtls-connection-to-kafka-in-spring-with-a-dynamically-loaded-certificate/79099513#79099513}, biburl = {https://www.bibsonomy.org/url/bcac3aaa799585160ed4d4469b166ce3/jil}, keywords = {authentication cert certificate client config dynamic kafka key ssl two way}, added-at = {2025-01-07T23:27:25.000+0100}, description = {ssl.keystore.key=-----BEGIN PRIVATE KEY-----\n$base64Pkcs8EncodedKey\n-----END PRIVATE KEY----- ssl.keystore.certificate.chain=-----BEGIN CERTIFICATE-----\n$base64EncodedCert\n-----END CERTIFICATE----- ssl.keystore.type=PEM ssl.truststore.certificates=-----BEGIN CERTIFICATE-----\n$base64EncodedCert\n-----END CERTIFICATE----- ssl.truststore.type=PEM}, interhash = {bcac3aaa799585160ed4d4469b166ce3}, intrahash = {bcac3aaa799585160ed4d4469b166ce3} } @electronic{windsorctlocksmith.wordpress.com, title = {Security Steps To Take Following Departure Of Employee Who Had Keys To The Business}, url = {https://windsorctlocksmith.wordpress.com/2024/04/26/security-steps-to-take-following-departure-of-employee-who-had-keys-to-the-business/}, biburl = {https://www.bibsonomy.org/url/ef82b9372cd306a46db1dcd21fa4641a/windsorctloc}, keywords = {Access Business Key Lock changing control, cyber-security, key, measures, retrieval, security}, added-at = {2024-05-19T22:02:18.000+0200}, description = {The departure of an employee who had access to keys to your business premises can pose significant security risks. Whether the separation was voluntary or involuntary, it’s essential to take proactive steps to safeguard your business and prevent unauthorized access.}, interhash = {ef82b9372cd306a46db1dcd21fa4641a}, intrahash = {ef82b9372cd306a46db1dcd21fa4641a} } @electronic{www.locksmithspartanburg.net, title = {Deadbolt Lock Installation Service in Spartanburg}, url = {http://www.locksmithspartanburg.net/residential-locksmith-Spartanburg.html}, biburl = {https://www.bibsonomy.org/url/be31346789847f45a8d0ee32d9bfb6a6/stblocks21}, keywords = {Broken Deadbolts Extraction, Home Installation, Key Keys Lockouts, Master Safes,}, added-at = {2024-03-16T02:44:51.000+0100}, description = {You'll find all your residential security solutions conveniently located in Spartanburg, South Carolina. Contact Locksmith Spartanburg for guaranteed service tailored to your needs. Our comprehensive offerings ensure optimal home security measures.}, interhash = {be31346789847f45a8d0ee32d9bfb6a6}, intrahash = {be31346789847f45a8d0ee32d9bfb6a6} } @electronic{www.merchantcircle.com, title = {Residential Reisterstown Locksmith}, url = {https://www.merchantcircle.com/reisterstown-secure-locksmith1-reisterstown-md}, biburl = {https://www.bibsonomy.org/url/f2604dccefb4f3e295e4f1a63fd9e55e/reisterstwls}, keywords = {Broken Door Extraction, Garage Gun Home Key Lockouts, Locks Reisterstown Safes,}, added-at = {2024-01-02T13:59:02.000+0100}, description = {For all your residential locksmith needs, repairs, and installations, Reisterstown Secure Locksmith stands out as the premier company in town. Give us a call now; we are ready to assist with any residential lock and security product. At Reisterstown Secure Locksmith, ensuring the constant security and protection of your residential space is our priority.}, interhash = {f2604dccefb4f3e295e4f1a63fd9e55e}, intrahash = {f2604dccefb4f3e295e4f1a63fd9e55e} } @electronic{pb.co.za, title = {keyboards and web apps, my post/rant for the year - Things.}, url = {https://pb.co.za/keyboards-and-web-apps-my-post-slash-rant-for-the-year}, biburl = {https://www.bibsonomy.org/url/2dee28d4e6ef88d7afe9709772d4d622/bshanks}, keywords = {key keyboard shortcut webdev}, added-at = {2023-07-16T00:30:18.000+0200}, description = {}, interhash = {2dee28d4e6ef88d7afe9709772d4d622}, intrahash = {2dee28d4e6ef88d7afe9709772d4d622} } @electronic{askubuntu.com, title = {20.04 - How do I delete or skip over a word or a line of text in ubuntu terminal? - Ask Ubuntu}, url = {https://askubuntu.com/questions/1268570/how-do-i-delete-or-skip-over-a-word-or-a-line-of-text-in-ubuntu-terminal}, biburl = {https://www.bibsonomy.org/url/d546b1ee56ea6a9ccea4215c145b7fea/jil}, keywords = {bash control delete emacs key move shortcut word}, added-at = {2023-06-23T16:19:18.000+0200}, description = {moving: to the end of the command: ctrl-e to the begin of the command: ctrl-a forward a word: alt-f backword a word: alt-b deleting: from current cursor position to the end of word: ald-d from current cursor position to the begin of word: clt-w}, interhash = {d546b1ee56ea6a9ccea4215c145b7fea}, intrahash = {d546b1ee56ea6a9ccea4215c145b7fea} } @electronic{askubuntu.com, title = {keyboard - Disable the default app key (super+num) functionality on Ubuntu 17.10 and later - Ask Ubuntu}, url = {https://askubuntu.com/questions/968103/disable-the-default-app-key-supernum-functionality-on-ubuntu-17-10-and-later/1137705#1137705}, biburl = {https://www.bibsonomy.org/url/44e9a19629818ae19235c8f99212a7fc/jil}, keywords = {application disable gnome key start super}, added-at = {2023-06-01T21:59:58.000+0200}, description = {for i in $(seq 1 9); do gsettings set org.gnome.shell.keybindings switch-to-application-${i} '[]'; done}, interhash = {44e9a19629818ae19235c8f99212a7fc}, intrahash = {44e9a19629818ae19235c8f99212a7fc} } @electronic{mjg59.dreamwidth.org, title = {mjg59 | PSA: upgrade your LUKS key derivation function}, url = {https://mjg59.dreamwidth.org/66429.html}, biburl = {https://www.bibsonomy.org/url/8c7a84e8a1d8ad6a13630321195f53bd/jil}, keywords = {derivation function key luks update}, added-at = {2023-04-20T09:42:33.000+0200}, description = {You want to be using argon2id. A KDF is a function that takes some input (in this case the user's password) and generates a key. Good KDFs reduce this risk by being what's technically referred to as "expensive". Rather than performing one simple calculation to turn a password into a key, they perform a lot of calculations. However, there's another axis of expense that can be considered - memory. If the KDF algorithm requires a significant amount of RAM, the degree to which it can be performed in parallel on a GPU is massively reduced.}, interhash = {8c7a84e8a1d8ad6a13630321195f53bd}, intrahash = {8c7a84e8a1d8ad6a13630321195f53bd} } @electronic{wiki.debian.org, title = {Subkeys - Debian Wiki}, url = {https://wiki.debian.org/Subkeys}, biburl = {https://www.bibsonomy.org/url/602483706ca03161139c872ac6acf0cf/jaeschke}, keywords = {cryptography gnupg gpg key management pgp privacy security subkey}, added-at = {2023-03-20T12:42:32.000+0100}, description = {gpg2 --with-keygrip --list-key}, interhash = {602483706ca03161139c872ac6acf0cf}, intrahash = {602483706ca03161139c872ac6acf0cf} } @electronic{lobste.rs, title = {Configuring VSCode as a Keyboard-Centric IDE | Lobsters}, url = {https://lobste.rs/s/xqlzax/configuring_vscode_as_keyboard_centric}, biburl = {https://www.bibsonomy.org/url/d2b2c223f670a80e224b6b05736dec44/bshanks}, keywords = {emacs evil evilre key keybind keybinding keyboard vscode}, added-at = {2023-01-27T07:05:25.000+0100}, description = {}, interhash = {d2b2c223f670a80e224b6b05736dec44}, intrahash = {d2b2c223f670a80e224b6b05736dec44} } @electronic{davi.sh, title = {Configuring VSCode as a Keyboard-Centric IDE | Davis Haupt}, url = {https://davi.sh/blog/2023/01/vscode-like-emacs/}, biburl = {https://www.bibsonomy.org/url/c03ef2d5555c6eefce75674b9b9124a0/bshanks}, keywords = {emacs evil evilre key keybind keybinding keyboard vim vscode}, added-at = {2023-01-27T07:03:40.000+0100}, description = {}, interhash = {c03ef2d5555c6eefce75674b9b9124a0}, intrahash = {c03ef2d5555c6eefce75674b9b9124a0} } @electronic{www.cylex.us.com, title = {Emergency Locksmith Jeffersontown}, url = {https://www.cylex.us.com/company/master-locksmith-jeffersontown-24974174.html}, biburl = {https://www.bibsonomy.org/url/a6126d272bdc61fa5ae8782e5ba46e56/locksjefferson}, keywords = {"broken "lock "locks" extraction" key replacement"}, added-at = {2021-07-01T08:57:44.000+0200}, description = {They will discuss the many options that we offer to help you with your locksmith needs. They can even provide you with the details of what can be done to address your specific locksmith needs. Master Locksmith Jeffersontown offers you a free consultation and a guarantee of satisfaction.}, interhash = {a6126d272bdc61fa5ae8782e5ba46e56}, intrahash = {a6126d272bdc61fa5ae8782e5ba46e56} } @electronic{www.bing.com, title = {Emergency Locksmith Sierra Vista}, url = {https://www.bing.com/local/Details.aspx?lid=YN873x526140040889785529}, biburl = {https://www.bibsonomy.org/url/72692ec6e91e3f7591b960d367211e83/sierravistals}, keywords = {"broken "lock "transponder chip" extraction" key replacement"}, added-at = {2021-05-07T15:43:58.000+0200}, description = {"Call our associates and discuss the many different things we can offer you for your locksmith needs. At Sierra Vista Locksmith we offer you the opportunity to consult with our associates at no charge. Contact us today and receive guaranteed satisfaction."}, interhash = {72692ec6e91e3f7591b960d367211e83}, intrahash = {72692ec6e91e3f7591b960d367211e83} } @electronic{news.ycombinator.com, title = {Ask HN: How does your company manage its encryption keys? | Hacker News}, url = {https://news.ycombinator.com/item?id=23390966}, biburl = {https://www.bibsonomy.org/url/f2de656ab8334f77ae93100d08fec049/bshanks}, keywords = {encrypt encryption key secret security}, added-at = {2021-02-19T21:56:41.000+0100}, description = {}, interhash = {f2de656ab8334f77ae93100d08fec049}, intrahash = {f2de656ab8334f77ae93100d08fec049} } @electronic{wiki.hsr.ch, title = {Key/Value Pair versus hstore - Benchmark_of_KVP_vs._hstore_-_doc.pdf}, url = {https://wiki.hsr.ch/Datenbanken/files/Benchmark_of_KVP_vs._hstore_-_doc.pdf}, biburl = {https://www.bibsonomy.org/url/de9177db6c9d281a7ad26797f0a3e2d0/jil}, keywords = {benchmark comparison hstore key performance postgres value}, added-at = {2020-10-15T10:32:54.000+0200}, description = {}, interhash = {de9177db6c9d281a7ad26797f0a3e2d0}, intrahash = {de9177db6c9d281a7ad26797f0a3e2d0} } @electronic{kb.wisconsin.edu, title = {Mutt - Signing and Encrypting Email Messages}, url = {https://kb.wisconsin.edu/4091}, biburl = {https://www.bibsonomy.org/url/30cff9dbadf164ff94bf5ba48228ee04/jil}, keywords = {certificate extract import key mutt pem public smime}, added-at = {2020-05-29T16:25:20.000+0200}, description = {Extract the PKCS#7 object: $ openssl smime -verify -in file.msg -noverify -pk7out > file.pk7 Dump the certificates in that file openssl pkcs7 -print_certs -in file.pk7 > file.pem Open the file in your favorite text editor and seperate out each certificate individually in to it's own file and import: For each CA certificate that you want to trust: smime_keys add_root file.pem Note: You do not need to trust all intermediate CAs. You can simply trust the end-user certificate. For the subject certificate that you want to add: smime_keys add_cert file.pem }, interhash = {30cff9dbadf164ff94bf5ba48228ee04}, intrahash = {30cff9dbadf164ff94bf5ba48228ee04} } @electronic{www.hotfrog.com, title = {Residential Locksmith in Gresham}, url = {https://www.hotfrog.com/company/1099485493166080}, biburl = {https://www.bibsonomy.org/url/69b950f473f1fecbe86c096fd0beb06c/greshamls}, keywords = {"broken "lock "transponder chip" extraction" key replacement"}, added-at = {2020-05-04T13:19:34.000+0200}, description = {Commercial business owners depend on us to help them figure out where they should place more security features. Motorists call on the services of Gresham Locksmith because we always show up fast. If you appreciate a professional locksmith service that will stand by their work and treat you like a valued customer, call us at Gresham Locksmith.}, interhash = {69b950f473f1fecbe86c096fd0beb06c}, intrahash = {69b950f473f1fecbe86c096fd0beb06c} } @electronic{foursquare.com, title = {Commercial Locksmith Gresham}, url = {https://foursquare.com/user/92591593/list/gresham-locksmiths}, biburl = {https://www.bibsonomy.org/url/59f3bae6688f585ae7bf1f920a07566e/greshamls}, keywords = {"broken "business "lock "locks" extraction" key key" replacement"}, added-at = {2020-05-04T13:16:39.000+0200}, description = {There will inevitably come a time when you'll need the services of an affordable and dependable locksmith in Gresham. When this time does arrive, you can count on the services of Gresham Locksmith. Gresham Locksmith specializes in residential, automotive and commercial locksmith services.}, interhash = {59f3bae6688f585ae7bf1f920a07566e}, intrahash = {59f3bae6688f585ae7bf1f920a07566e} } @electronic{www.kernel.org, title = {Linux Magic System Request Key Hacks — The Linux Kernel documentation}, url = {https://www.kernel.org/doc/html/v5.2/admin-guide/sysrq.html}, biburl = {https://www.bibsonomy.org/url/2bf16473d10ad34e1b43ed02fe1d01ab/jil}, keywords = {commands key linux magic sysrequest sysrq}, added-at = {2019-07-10T11:03:24.000+0200}, description = {}, interhash = {2bf16473d10ad34e1b43ed02fe1d01ab}, intrahash = {2bf16473d10ad34e1b43ed02fe1d01ab} } @electronic{ask.fedoraproject.org, title = {Virtualbox: Error - Ask Fedora: Community Knowledge Base and Support Forum}, url = {https://ask.fedoraproject.org/en/question/65473/virtualbox-error/}, biburl = {https://www.bibsonomy.org/url/cbe3f55ddcc6bb250e5a7503034816cd/becker}, keywords = {virtualbox vboc virtual box linux secureboot secure boot vboxsetup vbox modprobe setup install sign key}, added-at = {2019-02-06T05:03:57.000+0100}, description = {}, interhash = {cbe3f55ddcc6bb250e5a7503034816cd}, intrahash = {cbe3f55ddcc6bb250e5a7503034816cd} }