Profile

Cover photo
Geoff Bourne
Attended University of Oklahoma
Lives in Texas
811 followers|130,936 views
AboutPostsPhotosYouTube+1'sReviews

Stream

Geoff Bourne

Shared publicly  - 
 
Now, with this, don't need to clone a repo just to navigate its code.
Code search for the modern programmer. Find the code you need quickly, see anywhere in the open-source world that a function or library is used, and discover other like-minded programmers.
1
Geoff Bourne's profile photoChristopher Stehno's profile photo
3 comments
 
Ha! I'm blind! :-) Yeah, we are using Java 8 under Groovy 2.4, but honestly I have yet to use any of the new J8 features.
Add a comment...

Geoff Bourne

Shared publicly  - 
 
I'm dipping into some Go programming today. I had forgotten that it has no mercy for compilation warnings...but this feels like a very good thing.
1
Add a comment...
 
Did you know that you can use Shift-Insert to paste in Chrome even on Windows?

#UsingTerminalsTooMuch 
1
Sergey Maslyakov's profile photoJustin Forbes's profile photoGeoff Bourne's profile photo
4 comments
 
Ohhh, highlight-copy would be awesome. 
Add a comment...

Geoff Bourne

Shared publicly  - 
 
Since googling for this turned up no results, 19:25 of this video is the solution to the tricky bit on the Mustycyclops level of Kalimba for Xbox One.
1
Add a comment...
 
Agile software development at its finest? :)
America’s $400 billion Joint Strike Fighter, or F-35, is slated to join fighter squadrons next year—but missing software will render its 25mm cannon useless.
2
Add a comment...

Geoff Bourne

Shared publicly  - 
 
I just discovered the GitHub Gist editor supports Sublime-style column or multiple selections. I show one example below, but various Alt/Option combinations work.
1
Add a comment...
Have him in circles
811 people
Shoshannah Brenner's profile photo
Rael Rodning (The Planted Plate)'s profile photo
Kelly Kern's profile photo
Colm Costelloe's profile photo
Chaomo Li's profile photo
Joanne Pimanova's profile photo
MARIA DOS SANTOS LIMA's profile photo
Gilbert Gao's profile photo
Adrian O'Connor's profile photo

Geoff Bourne

Shared publicly  - 
 
I could have scripted this up in Bash, Groovy, etc, but in the spirit of Docker I wrote a utility I needed in Go.
docker-utils - Some simple utilities to manage Docker environments
1
Add a comment...

Geoff Bourne

Shared publicly  - 
 
There's some cool stuff coming in ECMAScript 6 (aka the next JavaScript version)
1
Add a comment...

Geoff Bourne

Shared publicly  - 
 
#AngularJS reminder: if you want to statically include another file with ng-include, then make sure to pass a literal string, as in

<ng-include src="'bits/other.html'"/>

(NOTE: the single quotes inside the double quotes)
Fetches, compiles and includes an external HTML fragment. By default, the template URL is restricted to the same domain and protocol as the application document. This is done by calling $sce.getTrustedResourceUrl on it. To load templates from other domains or protocols you may either whitelist ...
1
Add a comment...

Geoff Bourne

Shared publicly  - 
 
GitHub's Atom editor is a fast-moving target, so be aware that the Choco package has fallen 10 notches behind the direct distribution.
1
Add a comment...

Geoff Bourne

Shared publicly  - 
 
Getting ready for Christmas...Pixel Piracy style. It's super-on-sale at Steam right now.
1
Add a comment...

Geoff Bourne

Shared publicly  - 
 
This is a cool way to understand SSL...however, I'm left wondering: what if the postman tricked you by putting his lock on instead of the intended point B recipient??
 
The philosophy behind the 'secure' SSL connection or The Postman Always Rings Twice

Maybe you have asked yourself, how a 'secure, encrypted connection' to your bank could be built up, when no passwords or keys were exchanged before?

Imagine a travel suitcase with two locks. Now you have a postman, who transports this from you (point A) to somebody else (point B). And you don't want the postman have a look into your box. How can you do that without having to hand over the keys? Letting the postman transporting box and keys at the same time won't do!??

The solution:

You begin with locking your box with a single lock. The 'private key' to this lock you put into your pocket.
Now, you're handing over the box to the postman. He carries the locked box to point B.
The other person, the receiver, now locks the box with a second lock, also keeping his 'private key' in his pocket.
Now, the postman carries the box back to A, knocking on your door the second time. In his hands: The same box - double locked.

Now you remove your lock with your 'private key', putting lock and key into your pocket.

The postman now carries this box, just again 'single locked', but still locked, content invisible, inaccessible for the postman, back to B.

The postman knocking the second time on B's door, bringing the box, which indeed, still is locked - but no problem - B can open the box, since it's his own lock, he posesses the key for!

So lets summarize: The box was locked all the time, it was transported. The postman so had no chance to have a look into. Surprisingly, no key had to be transported.

You (A) and the receiver (B), often called "Alice" and "Bert" in cryptographic papers, never had to hand over the keys to the postman. You had them - all the time - in your own pocket.

Isn't that just amazing?? Just by transporting the double lock box two times back-and-forth, the need to reveal the key (handing over a key to the postman) simply becomes - void.

This is the core idea behind any 'public key' mechanism!

Imagine, US patent office would allow to patent such simple mechanisms, forcing the world to pay billions of $$$ license fees!!!

Now to the mechanism, how to emulate this suitcase with two locks.

From math you might know, that factoring a product of two primes, a 'decomposition' takes long. Testing a long random number for being prime, is easy, see Wikipedia. So you easily might generate long primes and multiply them, without another person to give a chance to split them up again. How can Alice and Bert now use this for emulating a suitcase with two locks?

Alice constructs a long prime (p) and a second long one (q). Alice now sends the product of these two primes to Bert:

A -> (p*q) -> B

Bert also constructs two long primes (v) and (w) and multiplying them (v*w). Bert, having received (p*q), so multiplies (p*q) with v and w, sends this back to Alice:

B -> (p*q*v*w) -> A

Alice now removes p (the first prime) by dividing the product (p*q*v*w) by p and sends it back to Bert:

A -> (q*v*w) -> B

Bert, of course knowing v and w, can divide (q*v*w) by v and w and now has - q!!!

q is the 'secret' prime now, with which Alice and Bert can encrypt their whole (SSL/SSH/...) traffic!!

Lets see, what 'the postman' saw:

The product of (p and q). No chance for him to reconstruct either p or q. The product (p,q,v,w) -> no chance to reconstruct v or w. The product (q,v,w) -> still no chance to reconstruct q.

The core idea behind is a simple regrouping of just 4 primes:

(p x q) x (v x w) becomes regrouped to p x (q x v) x w.

That's all you can know about SSL and 'asymetric key encryption':

Just two simple core ideas from 7th class math: A suitcase with two locks and a regrouping of four primes!

Happy christmas!
14 comments on original post
1
1
Steve Loker's profile photo
Add a comment...
People
Have him in circles
811 people
Shoshannah Brenner's profile photo
Rael Rodning (The Planted Plate)'s profile photo
Kelly Kern's profile photo
Colm Costelloe's profile photo
Chaomo Li's profile photo
Joanne Pimanova's profile photo
MARIA DOS SANTOS LIMA's profile photo
Gilbert Gao's profile photo
Adrian O'Connor's profile photo
Work
Occupation
Software architect/developer
Places
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
Currently
Texas
Previously
Edmond, Oklahoma - Brisbane, Queensland, AUS - Lexington, KY
Story
Tagline
Software architects are artists too
Introduction
I am a software developer working primarily with Java these days. I like architecting software solutions, which to me means: think big picture, find patterns in the problem and solution space, and code up elegant solutions.

Behind every great project I leave behind a framework and a solution, but going into a project the solution comes first.
Education
  • University of Oklahoma
    Computer Engineering, 1993 - 1998
Basic Information
Gender
Male
Other names
Geoffrey Bourne
Geoff Bourne's +1's are the things they like, agree with, or want to recommend.
Sourcegraph
sourcegraph.com

Code search for the modern programmer. Find the code you need quickly, see anywhere in the open-source world that a function or library is u

New Programming Jargon
blog.codinghorror.com

20 Jul 2012. New Programming Jargon. Stack Overflow – like most online communities I've studied – naturally trends toward increased strictne

itzg/docker-utils · GitHub
github.com

docker-utils - Some simple utilities to manage Docker environments

Registry fails on startup : `OSError: [Errno 2] No such file or director...
github.com

I have seen similar issues related to registry here, but this one seems different. I ran a docker run -d --name registry -p 80:5000 registry

Kernel Parameters ~~~~~~~~~~~~~~~~~ The following is a ...
www.kernel.org

Kernel Parameters ~~~~~~~~~~~~~~~~~ The following is a consolidated list of the kernel parameters as implemented by the __setup(), core_para

coreos/coreos-cloudinit
github.com

Contribute to coreos-cloudinit development by creating an account on GitHub.

Learn ES6 · 6to5
6to5.org

6to5 turns ES6+ code into vanilla ES5, so you can use next generation features today.

Inside the Linux boot process
www.ibm.com

The process of booting a Linux system consists of a number of stages. But whether you're booting a standard x86 desktop or a deeply embedded

How to use UTF-8 in resource properties with ResourceBundle
stackoverflow.com

I need to use UTF-8 in my resource properties using Java's ResourceBundle. When I enter the text directly into the properties file, it displ

VTech Laser 200 - Wikipedia, the free encyclopedia
en.wikipedia.org

The VTech Laser 200 was an early 8-bit home computer from 1983, also sold as the Salora Fellow (mainly in Fennoscandia, particularly Finland

Vertical centering of elements in HTML
www.web-plus-plus.com

The article describes the various methods of elements vertical centering of in HTML / CSS and provides the samples to demonstrate the use of

TIFF to JPG
www.tifftojpg.com

TIFF to JPG. About. TIFF to JPG is a free image converter, can help you to convert TIFF/TIF images to JPG/JPEG images. This freeware is easy

Apache Spark: 100 terabytes (TB) of data sorted in 23 minutes | Opensour...
opensource.com

How Databricks set a new world record for sorting 100 terabytes (TB) of data, or 1 trillion 100-bytes, in 23 minutes with open source softwa

AngularJS Documentation for ngInclude
docs.angularjs.org

Fetches, compiles and includes an external HTML fragment. By default, the template URL is restricted to the same domain and protocol as the

New U.S. Stealth Jet Can’t Fire Its Gun Until 2019
www.thedailybeast.com

America’s $400 billion Joint Strike Fighter, or F-35, is slated to join fighter squadrons next year—but missing software will render its 25m

Arity - Wikipedia, the free encyclopedia
en.wikipedia.org

In logic, mathematics, and computer science, the arity Listen/ˈærɨti/ of a function or operation is the number of arguments or operands the

Use Excel Formulas to Highlight Duplicate Rows
www.excelfunctions.net

Use Excel Formulas to Highlight Duplicate Rows in Your Spreadsheet

Adding a new LVM partition with GNU parted
syedaali.wordpress.com

In this brief article I will explain how to add a new physical parition to an existing disk, and then to use that new parition to create a m

Family Knows Better Than To Fall For Mom’s Little Bullshit Speech About ...
www.theonion.com

RICHMOND, VA—Saying that several of them had learned the hard way, members of the Gordon family confirmed to reporters Friday that they knew

24 random docker tips by Csaba Palfi
csaba.palfi.me

We love docker and had it in production since 0.8 at TES Global. Couple of us could attend the trainings at dockerConEU thanks to Contino. H

It's a nice, big nature park that you wouldn't expect in the suburbs...however, on hot days too much of the paths are not shaded and become unbearable. The unpaved walking trails, which we prefer, are a crap shoot -- some have great views, varying terrain, etc; but some take you into areas full of poison ivy. The playground is great for younger kids and I like that it has wheelchair access without being gaudy about it.
Public - 7 months ago
reviewed 7 months ago
Public - 7 months ago
reviewed 7 months ago
They have a much better selection of games than any other arcade I have seen in a long time -- lots of pinball machines, a few retro machines, and ticket-games that aren't just pull the lever/drop the coin...and not 50% driving games and 50% shooting games like too many arcades these days.
Public - 7 months ago
reviewed 7 months ago
Public - a year ago
reviewed a year ago
7 reviews
Map
Map
Map
Public - 7 months ago
reviewed 7 months ago
Public - 11 months ago
reviewed 11 months ago