Update Policy

Tuesday update policy …..

Never Mondays, because some big organisations have IT rules that set Mondays aside for clearing up any crises that might have happened over the immediately preceding weekend.

Never Fridays, in case of any crises that might arise in the immediately following weekend as a result.

And never Wednesdays or Thursdays, because Tuesday gives you the longest clear run of spare weekdays before Friday arrives and shuts down the so-called “change window” once again.

Posted in Uncategorized | Leave a comment

Who do I want to be during COVID19 ?

Posted in Uncategorized | Leave a comment

Oath2 protocol in grant flow

Posted in Uncategorized | Leave a comment




xxx => header consist in 2 parts : the type of the toker which is JWT and the signing algorithm being used, such as HMAC SHA256 or RSA.



“alg”: “HS256”,

“typ”; “JWT”


And then this JSON is Base64Url encoded to form the first part of the the JWT

yyy => payload contains the claims. Claims are statement about an entity (tipically, the user and additional data. 3 types of claims registered, public and private claims

  • Registered claims are a set of predefined claims which are not mandatory but recommended. Iss(issuer),exp(expiration time), sub(subject), aud(audience)
  • Public claims:  these can be defined at will by those using JWT’s but to avoid collision they should be defined in the iana json web token tegistry or be defined as UTI that contains a collision resistant namespaces
  • Private claims : these are custom claims created to share information between parties that gree using them


“sub”: 1234567,

“name” : John Doe,

“admin”: true


ZZZ => Signature to create signature part you have to take the encoded header, the encoded payload, a secret, the algorithm specified in the header, and sign that


base64UrlEncode(header) +  “.” +



Application(Client) => 1) authorization Server 2) => Application (Client) => 3) API resource server

  1. The client application requests authorization to the authorization server. This is performed through one of the different authorization flows hereunder:

The Authorization Code Flow goes through the following steps.

  • Client prepares an Authentication Request containing the desired request parameters.
  • Client sends the request to the Authorization Server.
  • Authorization Server Authenticates the End-User.
  • Authorization Server obtains End-User Consent/Authorization.
  • Authorization Server sends the End-User back to the Client with an Authorization Code.
  • Client requests a response using the Authorization Code at the Token Endpoint.
  • Client receives a response that contains an ID Token and Access Token in the response body.
  • Client validates the ID token and retrieves the End-User’s Subject Identifier
  • When the authorization is granted the authorization server returns an access token to the application.
  • The application uses the access token to access a protected resource (like an API)

Information in signed tokens are exposed to users and or other parties. Even though they can’t change it. Secret information shouldn’t be stored within the token

Posted in API, JSON | Leave a comment

Install Ruby on Rails in MacOS

1) configure nano .bash_profile
export PATH="$PATH:/Users/drini/bin:/usr/local/bin:/usr/local/sbin/:usr/local/mysql/bin"
need to re-open the terminal in order the change to take in the account

2) install XCode because we neeed to use the compiler GCC
xcode-select --install
check if the gcc is installed by executing gcc -v

3) install the package manager for the OS X called homebrew from https://brew.sh/
– check the installation version with the following commande
brew doctor and brew update
– please reopen the terminal inorder to take in account the changes

4) install or verify if ruby is installed through homebrew ( with RVM or the rbenv)
ruby -v
brew install rbenv
vi .bash_profile and add the following line eval "$(rbenv init -)"
– if you want to avoid the restart of the terminal you can run source ˜/.bash_profile
rbenv install --liste
rbenv install 2.5.0
rbenv rehash
rbenv versions
ruby -v
rbenv global 2.5.0

5) install RubyGems and the Gem called Rails
gem -v
gem update --system
gem install rails

6) install MySQL with homebrew command
brew install mysql
brew services start mysql
mysql -uroot -p
gem install mysql2

7) install webserver nginx (puma can be an alternative)
brew install nginx
sudo nginx
sudo nginx -s stop
sudo nginx
-Testing, Open Navigator it by going to URL:
– Configuration, The default place of nginx.conf on Mac after installing with brew is:

8) texteditors IDE’s and other business
– Atom, Sublime Textmate, RubyMIne Eclipse, Netbeans

9) Create project create database and manage projects
mdkdir Sites
cd Sites
rails new demo_site -d myssql
rbenv local2.5.0
mysql -ruser -p
CREATE DATABASE demo_site_dev
CREATE DATABASE demo_site_test
GRANT ALL PRIVILEGES ON demo_site_dev.* TO 'demo_user'@'localhost' IDENTIFIED BY 'demoPass';
GRANT ALL PRIVILEGES ON demo_site_test.* TO 'demo_user'@'localhost' IDENTIFIED BY 'demoPass';
rails db:schema:dump
rails server

Posted in Apple-MacOS | Leave a comment

Integrate S/MIME Certificates with Microsoft Outlook

First of all you can obtain the the certificate from the following address https://www.instantssl.com/ssl-certificate-products/free-email-certificate.html strongly recommended to use internet explorer

  • When you receive the certificate under name.cer you need to convert it before creating the digital identity under outlook, so install the certificate on firefox and backup it in a certificate name.p12 format
  • > Open Outlook and click the File tab in the ribbon.
    On the left hand menu list, click Options > Trust Center > Trust Center Settings… button.
    A window named Trust Center will appear. Click E-mail Security (on the left).
    Click Import/Export
    Import existing Digital ID from a file and Browse, select the file backed up from Mozilla firefox earlier
    > Once this done you should check the options for the Signing Certificate
Posted in Uncategorized | Leave a comment

How to crop, size and postion filters

  1. select video clip
  2. Select filter
  3. click on the plus icon and then
  4. on the show video icon select crop
  5. select options
  6. select video clip options


Posted in Shotcut video editor | Leave a comment

Video Producing

Technical Decisions to address before video capture

  1. Aspection ration 16:9 or 4:3
  2. Interlaced vs progressive
  3. Frame Rates 24 fps / 30 fps / 60 fps
  4. Frame size
  • DIT => Digital Imaging Tech
  • BTS => Behind The Scenes
Posted in Uncategorized | Leave a comment

Word protected file with password, how to remove protection

  • rename the file extension from .doc or .docx to .zip
  • open the new .zip file and under the folder /word delete the settings.xml files
  • another option will be to edit the settings.xml and and change the
    w:enforcement=”1″ to w:enforcement=”on”, (or replace “on” with “off”
  • rename the zip file to .doc or docx and now you can open and modify it

Posted in Uncategorized | Leave a comment

Linux Privacy distros

  1. Linux kodachi https://www.digi77.com/linux-kodachi/
  2. Subgraph OS https://subgraph.com/
  3. Tails https://tails.boum.org/
  4. Whonix https://www.whonix.org/
  5. Tens
Posted in Linux | Leave a comment