The Wiert Corner – irregular stream of stuff

Jeroen W. Pluimers on .NET, C#, Delphi, databases, and personal interests

  • My badges

  • Twitter Updates

  • My Flickr Stream

  • Pages

  • All categories

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,854 other subscribers

Author Archive

Tribal Knowledge? Getting the public keys from github and gitlab users from their username

Posted by jpluimers on 2025/04/03

Learned a while ago: if you have the username from a GitHub or GitLab user, you can download interesting that sometimes can make life easier (but not necessarily more secure):

  • github.com/username.keys gives you their public SSH keys
  • gitlab.com/username.keys gives you their public SSH keys
  • github.com/username.png gives you their profile image

And that there are tools like gh, glab and age that can make direct use of them.

I love Twitter, so thanks for these for teaching me these little tricks:

Read the rest of this entry »

Posted in *nix, *nix-tools, ArchiveTeamWarrior, Conference Topics, Conferences, Development, Event, GitHub, GitLab, Internet, InternetArchive, OpenSSH, Power User, Software Development, Source Code Management, SSH, ssh/sshd, WayBack machine | Tagged: , | Leave a Comment »

Installing Chocolatey on Windows 10 and up

Posted by jpluimers on 2025/04/02

Steps for installing Chocolatey on Windows 11 and up or 10 version 1803 and up.

Since I often install Windows on machines where it is not easy to copy/paste longer install commands my steps are slightly different than the ones on [Wayback/Archive] Chocolatey Software | Installing Chocolatey:

  1. Start a regular command prompt
  2. Either these two (the options are equivalent, see [Wayback/Archive] curl: transfer a URL | curl Commands | Man Pages | ManKier for --remote-name and -O):
    • curl --remote-name https://community.chocolatey.org/install.ps1
    • curl -O https://community.chocolatey.org/install.ps1

    Note the cURL pre-installed on Windows 10 since at least 6 years*: release 1803 or insider build 17063 is good enough to download the Chocolatey install script

  3. Inspect the downloaded install.ps1 to check if you spot anything you dislike
  4. Start an elevated (administrator) command prompt
  5. Start PowerShell
  6. Execute this command
    • Set-ExecutionPolicy Bypass -Scope Process -Force
  7. Execute this command in the folder where you downloaded install.ps1
    • .\install.ps1
  • Yup, a custom build of cURL has been pre-installed on Windows 10 and up since more than 6 years:

Read the rest of this entry »

Posted in *nix, *nix-tools, Chocolatey, cURL, Development, Power User, Software Development, Windows, Windows 10, Windows 11, Windows Development | Leave a Comment »

Some HTTP redirect checking sites compared

Posted by jpluimers on 2025/04/02

 

Every now and then I want to check how a URL redirect, for instance when checking out why a domain failed loading in browsers a while ago because of certificate problems:

The thing was that back then, the site officially did not have a security certificate, but somehow the provider had installed a self-signed one. Most web-browsers then auto-redirect from http to https. Luckily the archival sites can archive without redirecting:

When querying [Wayback/Archive] redirect check – Google Search, you get quite some results. These are the ones I use most in descending order of preference and why they are at that position:

Read the rest of this entry »

Posted in *nix, *nix-tools, archive.is / archive.today, Communications Development, Development, Encryption, HTTP, https, HTTPS/TLS security, Internet, Internet protocol suite, ISP, Power User, Security, Software Development, TCP, WayBack machine, Web Development, wget, xs4all | Leave a Comment »

Welcome to #AprilApples! Apple II Computer event celebrated in the month of April

Posted by jpluimers on 2025/04/01

AprilApples Apple II Computer Event LogoLast year, #Appril][ got rebranded into #AprilApples, so I wish you a happy retro-month filled with April Apples!

[Wayback/Archive] Welcome to #AprilApples! Apple II Computer event celebrated in the month of April

Consider using the [Wayback/Archive] #AprilApples Style Guide with logon on the right, plus Garamond and/or Motter Tektura typeface when possible to really give tribute to the Apple ][ era.


Last year, a big surprise was that Apple Computer put a PDF version of the famous Apple Pascal Poster on the Internet Archive.

So today is a great day to give that more traction and link to it:

A year before, during April][, a remake of that poster got done on AppleFritter: Home[Wayback/Archive] Apple pascal poster, remade | Applefritter

Via [Wayback/Archive] Javmaster@bsky.social: “http://appril2.com/ ” – Mastodon

Fonts:

Images (I used a solid CSS brown background so you can see the difference between the regular logo and the outlined logo):

--jeroen

Posted in //e, 6502, Apple, Apple ///, Apple Lisa, Apple ][, Classic Macintosh, History, Power User | Tagged: , , | Leave a Comment »

Ryan Els on X: “Center-aligned code just looks better 🥰 https://t.co/AP2l22jHRG” / X

Posted by jpluimers on 2025/04/01

[Wayback/Archive] Ryan Els on X: “Center-aligned code just looks better 🥰 …”

[Wayback/Archive] Tweet JSON

[Wayback/Archive] Gel3nsxWUAALM77.jpg:orig (617×776)

--jeroen


Posted in Development, Fun, Software Development | Leave a Comment »

Personalised audio cards and video books with your own video or audio file

Posted by jpluimers on 2025/04/01

For Whamageddon or Rickrolling: [Wayback/Archive] Personalised audio cards and video books with your own video or audio file (UK) /

[Wayback/Archive] Wenskaart met ingesproken boodschap of eigen muziek – Geluidkaartje (Dutch).

Or build your own with chips like these: [Wayback/Archive] 30S Sound Voice Music Recorder Board Voice Chip Module for Greeting Card DIY | eBay

Or buy blank cards:

Via [Wayback/Archive] sound record your own postcard – Google Search

--jeroen

Posted in Development, Fun, Hardware Development, Hardware Interfacing, Power User | Leave a Comment »

If your organisation still requires users to change passwords periodically, or imposes other composition rules like special characters, then you should be publicly shamed.

Posted by jpluimers on 2025/03/31

As of more than half a year ago, end of august 2024, these two NIST requirements had changed from SHOUND NOT into SHALL NOT (yup, ALL CAPS and bold!) almost 2 years ago:

  • Verifiers and CSPs SHALL NOT impose other composition rules (e.g., requiring mixtures of different character types) for passwords.
  • Verifiers and CSPs SHALL NOT require users to change passwords periodically. However, verifiers SHALL force a change if there is evidence of compromise of the authenticator.

[Wayback/Archive] NIST Special Publication 800-63B (Wed, 28 Aug 2024 20:39:12 -0500)

Even back in 2017 when they were phrased as “SHOULD NOT” , it was a strong clue that it was unwanted behaviour and for new sites/projects do better.

So if your web-site still doesn’t do better: shame on you, preferably public.

History

  • 20240828 [Wayback/Archive] NIST Special Publication 800-63B moved everything up and made it into a bulleted list:

    3.1.1.2 Password Verifiers

    • Verifiers and CSPs SHALL NOT impose other composition rules (e.g., requiring mixtures of different character types) for passwords.
    • Verifiers and CSPs SHALL NOT require users to change passwords periodically. However, verifiers SHALL force a change if there is evidence of compromise of the authenticator.
    • Verifiers and CSPs SHALL NOT permit the subscriber to store a hint that is accessible to an unauthenticated claimant.
    • Verifiers and CSPs SHALL NOT prompt subscribers to use knowledge-based authentication (KBA) (e.g., “What was the name of your first pet?”) or security questions when choosing passwords.
  • 20221218 [Wayback/Archive] NIST Special Publication 800-63B where “password” was still called “memorized secrets”, “Verifiers and CPSs” was still “Verifiers”, and had the information 2 chapters further down:

    5.1.1.2 Memorized Secret Verifiers

    Verifiers SHALL NOT impose other composition rules (e.g., requiring mixtures of different character types or prohibiting consecutively repeated characters) for memorized secrets. Verifiers SHALL NOT require users to periodically change memorized secrets. However, verifiers SHALL force a change if there is evidence of compromise of the authenticator.

    Memorized secret verifiers SHALL NOT permit the subscriber to store a hint that is accessible to an unauthenticated claimant. Verifiers SHALL NOT prompt subscribers to use specific types of information (e.g., “What was the name of your first pet?”, a technique known as knowledge-based authentication (KBA) or security questions) when choosing memorized secrets.

  • 20170701 [Wayback/Archive] NIST Special Publication 800-63B reversed the first two and last two, had the less strong “SHOULD NOT” instead of “SHALL NOT”, and didn’t mention “knowledge-based authentication”

    Memorized secret verifiers SHALL NOT permit the subscriber to store a “hint” that is accessible to an unauthenticated claimant. Verifiers SHALL NOT prompt subscribers to use specific types of information (e.g., “What was the name of your first pet?”) when choosing memorized secrets.

    Verifiers SHOULD NOT impose other composition rules (e.g., requiring mixtures of different character types or prohibiting consecutively repeated characters) for memorized secrets. Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically). However, verifiers SHALL force a change if there is evidence of compromise of the authenticator.

  • 20170112: [Wayback/Archive] DRAFT NIST Special Publication 800-63B still had “also” in the first paragraph, had a shorter explanation for composition rules, and still mentioned change on subscriber request:

    Memorized secret verifiers SHALL NOT permit the subscriber to store a “hint” that is accessible to an unauthenticated claimant. Verifiers also SHALL NOT prompt subscribers to use specific types of information (e.g., “What was the name of your first pet?”) when choosing memorized secrets.

    Verifiers SHOULD NOT impose other composition rules (e.g., mixtures of different character types) on memorized secrets. Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically) and SHOULD only require a change if the subscriber requests a change or there is evidence of compromise of the authenticator.

  • 20160623: [Wayback/Archive] DRAFT NIST Special Publication 800-63B had a shorter last paragraph:

    Memorized secret verifiers SHALL NOT permit the subscriber to store a “hint” that is accessible to an unauthenticated claimant. Verifiers also SHALL NOT prompt subscribers to use specific types of information (e.g., “What was the name of your first pet?”) when choosing memorized secrets.

    Verifiers SHOULD NOT impose other composition rules (mixtures of different character types, for example) on memorized secrets. Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically) unless there is evidence of compromise of the authenticator or a subscriber requests a change.

[Wayback/Archive] NIST Special Publication 800-63B

Requirements Notation and Conventions

The terms “SHALL” and “SHALL NOT” indicate requirements to be followed strictly in order to conform to the publication and from which no deviation is permitted.

The terms “SHOULD” and “SHOULD NOT” indicate that among several possibilities one is recommended as particularly suitable, without mentioning or excluding others, or that a certain course of action is preferred but not necessarily required, or that (in the negative form) a certain possibility or course of action is discouraged but not prohibited.

The terms “MAY” and “NEED NOT” indicate a course of action permissible within the limits of the publication.

The terms “CAN” and “CANNOT” indicate a possibility or capability, whether material, physical or causal or, in the negative, the absence of that possibility or capability.

Note that it doesn’t help that NIST uses 3 definitions for CSP (the 4th is a plural) as seen in [Wayback/Archive] CSP – Glossary | CSRC

  • Cloud Service Provider

    NIST SP 800-12 Rev. 1, NIST SP 800-215, NIST SP 800-66r2, NISTIR 8320

  • Credential Service Provider

    NIST SP 1800-12b, NIST SP 1800-21B, NIST SP 800-203, NIST SP 800-63-3

  • Credentials Service Provider

    CNSSI 4009-2015

  • Critical Security Parameter

    NIST SP 800-56B Rev. 2

In this case, I assume Credential Service Provider, though it would have helped including the abbreviations in section

Keywords

authentication; credential service provider; digital authentication; digital credentials; electronic authentication; electronic credentials, federation.

Via

[Wayback/Archive] Merill Fernando on X: “Folks it’s 2024 and the new NIST draft for digital identity is asking you to STOP the madness of 30/90 days password resets and moving it from a recommendation → to a REQUIREMENT Microsoft admins here’s what you need to do: → Turn on risk based conditional access policy → …”

https://web.archive.org/web/20240924124348im_/https://pbs.twimg.com/media/GYOmHAaacAAKRP9.png

Related

[Wayback/Archive] Thread by @merill on Thread Reader App – It’s 2023 and your IT team is still forcing the entire company to change their passwords every few months

--jeroen

Posted in Power User, Security | Leave a Comment »

git on Windows: figuring out SID mismatch

Posted by jpluimers on 2025/03/31

A few years back I had an error happen a while on one of my Windows machines after a git pull: fatal: detected dubious ownership in repository at 'C:/versioned/repository' followed by a few lines with Windows SIDs (Security Identifiers) that I had to map to actual users.

I thought I had it scheduled, but my notes were in a draft post, so when I bumped into it again when upgrading an old virtual machine with new versions I finished it and scheduled it for now.

The first time I got the error was after git for Windows fixed security vulnerability [Wayback/Archive] CVE-2022-24765 and included the quote from [Wayback/Archive] Uncontrolled search for the Git directory in Git for Windows · Advisory · git-for-windows/git:

Read the rest of this entry »

Posted in CommandLine, Development, DVCS - Distributed Version Control, git, Power User, PowerShell, PowerShell, Scripting, Software Development, Source Code Management, Windows, Windows 10, Windows 11, Windows 7 | Tagged: | Leave a Comment »

Direct deep links to Amazon help pages

Posted by jpluimers on 2025/03/28

For me, it is always difficult to navigate to the Amazon help pages where you can reach their chat.

These are some of the links; follow the pattern to figure out which domain part you need to replace to get to your local ones:

--jeroen

Posted in Amazon.com/.de/.fr/.uk/..., Cloud, Infrastructure, LifeHacker, Power User | Leave a Comment »

For my link archive: 8 things you didn’t know you could do with GitHub Copilot | The GitHub Blog

Posted by jpluimers on 2025/03/28

Hopefully by now I have given GitHub Copilot so I can put this link from a while back into more perspective: [Wayback/Archive] 8 things you didn’t know you could do with GitHub Copilot | The GitHub Blog.

I saved it for my link archive as these thought processes take me a while. The conceptual thing here is if I want to pay for products that harvest profit from the enormous time and effort invested by open source authors (in this case even after the fact, as there was no way to opt out while most of the harvesting took place). See my earlier post On my list of extensions to try in vscode: tab nine.

An alternative for parts of GitHub Copilot might be the (then working title) TLDR from [Wayback/Archive] Beyond Code (German and have the domain beyondco.de). Read the rest of this entry »

Posted in Development, Power User, Software Development, vscode Visual Studio Code | Leave a Comment »