From: Petter Reinholdtsen Date: Tue, 25 Mar 2014 11:52:21 +0000 (+0000) Subject: Generated. X-Git-Url: https://pere.pagekite.me/gitweb/homepage.git/commitdiff_plain/024146da7e14da1a2658b445bdc0b4efd8c3d635 Generated. --- diff --git a/blog/Public_Trusted_Timestamping_services_for_everyone.html b/blog/Public_Trusted_Timestamping_services_for_everyone.html index 585a5a4463..ffee4a7416 100644 --- a/blog/Public_Trusted_Timestamping_services_for_everyone.html +++ b/blog/Public_Trusted_Timestamping_services_for_everyone.html @@ -45,11 +45,13 @@ few years ago as RFC 3161. The mechanism is simple. Create a hash of the file in question, send it to a trusted third party which add a time stamp to the hash and sign the result with its private key, and send back the -signed hash + timestamp. Anyone with the document and the signature -can then verify that the document matches the signature by creating -their own hash and checking the signature using the trusted third -party public key. There are several commercial services around -providing such timestamping. A quick search for +signed hash + timestamp. Both email, FTP and HTTP can be used to +request such signature, depending on what is provided by the service +used. Anyone with the document and the signature can then verify that +the document matches the signature by creating their own hash and +checking the signature using the trusted third party public key. +There are several commercial services around providing such +timestamping. A quick search for "rfc 3161 service" pointed me to at least DigiStamp, @@ -64,16 +66,18 @@ trusted third party is not compromised.

timestamp services available for everyone. I've been looking for one for a while now. But yesterday I found one over at Deutches -Forschungsnetzmentioned in +Forschungsnetz mentioned in a blog by David Müller. I then found a good recipe on how to use over at the University -of Greifswald. The OpenSSL library contain both server and tools -to use and set up your own signing service. See the ts(1SSL), -tsget(1SSL) manual pages for more details. The following shell script -demonstrate how to extract a signed timestamp for any file on the disk -in a Debian environment: +of Greifswald.

+ +

The OpenSSL library contain +both server and tools to use and set up your own signing service. See +the ts(1SSL), tsget(1SSL) manual pages for more details. The +following shell script demonstrate how to extract a signed timestamp +for any file on the disk in a Debian environment:

 #!/bin/sh
diff --git a/blog/archive/2014/03/03.rss b/blog/archive/2014/03/03.rss
index 8fd8097725..850f18c1fb 100644
--- a/blog/archive/2014/03/03.rss
+++ b/blog/archive/2014/03/03.rss
@@ -34,11 +34,13 @@ few years ago as <a href="http://tools.ietf.org/html/rfc3161">RF
 3161</a>.  The mechanism is simple.  Create a hash of the file in
 question, send it to a trusted third party which add a time stamp to
 the hash and sign the result with its private key, and send back the
-signed hash + timestamp.  Anyone with the document and the signature
-can then verify that the document matches the signature by creating
-their own hash and checking the signature using the trusted third
-party public key.  There are several commercial services around
-providing such timestamping.  A quick search for
+signed hash + timestamp.  Both email, FTP and HTTP can be used to
+request such signature, depending on what is provided by the service
+used. Anyone with the document and the signature can then verify that
+the document matches the signature by creating their own hash and
+checking the signature using the trusted third party public key.
+There are several commercial services around providing such
+timestamping.  A quick search for
 "<a href="https://duckduckgo.com/?q=rfc+3161+service">rfc 3161
 service</a>" pointed me to at least
 <a href="https://www.digistamp.com/technical/how-a-digital-time-stamp-works/">DigiStamp</a>,
@@ -53,16 +55,18 @@ trusted third party is not compromised.</p>
 timestamp services available for everyone.  I've been looking for one
 for a while now. But yesterday I found one over at
 <a href="https://www.pki.dfn.de/zeitstempeldienst/">Deutches
-Forschungsnetz</a>mentioned in
+Forschungsnetz</a> mentioned in
 <a href="http://www.d-mueller.de/blog/dealing-with-trusted-timestamps-in-php-rfc-3161/">a
 blog by David Müller</a>.  I then found a good recipe on how to use
 over at the
 <a href="http://www.rz.uni-greifswald.de/support/dfn-pki-zertifikate/zeitstempeldienst.html">University
-of Greifswald</a>.  The OpenSSL library contain both server and tools
-to use and set up your own signing service.  See the ts(1SSL),
-tsget(1SSL) manual pages for more details.  The following shell script
-demonstrate how to extract a signed timestamp for any file on the disk
-in a Debian environment:
+of Greifswald</a>.</p>
+
+<p><a href="http://www.openssl.org/">The OpenSSL library</a> contain
+both server and tools to use and set up your own signing service.  See
+the ts(1SSL), tsget(1SSL) manual pages for more details.  The
+following shell script demonstrate how to extract a signed timestamp
+for any file on the disk in a Debian environment:</p>
 
 <p><blockquote><pre>
 #!/bin/sh
diff --git a/blog/archive/2014/03/index.html b/blog/archive/2014/03/index.html
index 17edc52cfe..e95877eaef 100644
--- a/blog/archive/2014/03/index.html
+++ b/blog/archive/2014/03/index.html
@@ -52,11 +52,13 @@ few years ago as RFC
 3161.  The mechanism is simple.  Create a hash of the file in
 question, send it to a trusted third party which add a time stamp to
 the hash and sign the result with its private key, and send back the
-signed hash + timestamp.  Anyone with the document and the signature
-can then verify that the document matches the signature by creating
-their own hash and checking the signature using the trusted third
-party public key.  There are several commercial services around
-providing such timestamping.  A quick search for
+signed hash + timestamp.  Both email, FTP and HTTP can be used to
+request such signature, depending on what is provided by the service
+used. Anyone with the document and the signature can then verify that
+the document matches the signature by creating their own hash and
+checking the signature using the trusted third party public key.
+There are several commercial services around providing such
+timestamping.  A quick search for
 "rfc 3161
 service" pointed me to at least
 DigiStamp,
@@ -71,16 +73,18 @@ trusted third party is not compromised.

timestamp services available for everyone. I've been looking for one for a while now. But yesterday I found one over at Deutches -Forschungsnetzmentioned in +Forschungsnetz mentioned in a blog by David Müller. I then found a good recipe on how to use over at the University -of Greifswald. The OpenSSL library contain both server and tools -to use and set up your own signing service. See the ts(1SSL), -tsget(1SSL) manual pages for more details. The following shell script -demonstrate how to extract a signed timestamp for any file on the disk -in a Debian environment: +of Greifswald.

+ +

The OpenSSL library contain +both server and tools to use and set up your own signing service. See +the ts(1SSL), tsget(1SSL) manual pages for more details. The +following shell script demonstrate how to extract a signed timestamp +for any file on the disk in a Debian environment:

 #!/bin/sh
diff --git a/blog/index.html b/blog/index.html
index 6a18f73785..722aa1a74f 100644
--- a/blog/index.html
+++ b/blog/index.html
@@ -45,11 +45,13 @@ few years ago as RFC
 3161.  The mechanism is simple.  Create a hash of the file in
 question, send it to a trusted third party which add a time stamp to
 the hash and sign the result with its private key, and send back the
-signed hash + timestamp.  Anyone with the document and the signature
-can then verify that the document matches the signature by creating
-their own hash and checking the signature using the trusted third
-party public key.  There are several commercial services around
-providing such timestamping.  A quick search for
+signed hash + timestamp.  Both email, FTP and HTTP can be used to
+request such signature, depending on what is provided by the service
+used. Anyone with the document and the signature can then verify that
+the document matches the signature by creating their own hash and
+checking the signature using the trusted third party public key.
+There are several commercial services around providing such
+timestamping.  A quick search for
 "rfc 3161
 service" pointed me to at least
 DigiStamp,
@@ -64,16 +66,18 @@ trusted third party is not compromised.

timestamp services available for everyone. I've been looking for one for a while now. But yesterday I found one over at Deutches -Forschungsnetzmentioned in +Forschungsnetz mentioned in a blog by David Müller. I then found a good recipe on how to use over at the University -of Greifswald. The OpenSSL library contain both server and tools -to use and set up your own signing service. See the ts(1SSL), -tsget(1SSL) manual pages for more details. The following shell script -demonstrate how to extract a signed timestamp for any file on the disk -in a Debian environment: +of Greifswald.

+ +

The OpenSSL library contain +both server and tools to use and set up your own signing service. See +the ts(1SSL), tsget(1SSL) manual pages for more details. The +following shell script demonstrate how to extract a signed timestamp +for any file on the disk in a Debian environment:

 #!/bin/sh
diff --git a/blog/index.rss b/blog/index.rss
index f1670fb5b5..cb9be1f661 100644
--- a/blog/index.rss
+++ b/blog/index.rss
@@ -34,11 +34,13 @@ few years ago as <a href="http://tools.ietf.org/html/rfc3161">RF
 3161</a>.  The mechanism is simple.  Create a hash of the file in
 question, send it to a trusted third party which add a time stamp to
 the hash and sign the result with its private key, and send back the
-signed hash + timestamp.  Anyone with the document and the signature
-can then verify that the document matches the signature by creating
-their own hash and checking the signature using the trusted third
-party public key.  There are several commercial services around
-providing such timestamping.  A quick search for
+signed hash + timestamp.  Both email, FTP and HTTP can be used to
+request such signature, depending on what is provided by the service
+used. Anyone with the document and the signature can then verify that
+the document matches the signature by creating their own hash and
+checking the signature using the trusted third party public key.
+There are several commercial services around providing such
+timestamping.  A quick search for
 "<a href="https://duckduckgo.com/?q=rfc+3161+service">rfc 3161
 service</a>" pointed me to at least
 <a href="https://www.digistamp.com/technical/how-a-digital-time-stamp-works/">DigiStamp</a>,
@@ -53,16 +55,18 @@ trusted third party is not compromised.</p>
 timestamp services available for everyone.  I've been looking for one
 for a while now. But yesterday I found one over at
 <a href="https://www.pki.dfn.de/zeitstempeldienst/">Deutches
-Forschungsnetz</a>mentioned in
+Forschungsnetz</a> mentioned in
 <a href="http://www.d-mueller.de/blog/dealing-with-trusted-timestamps-in-php-rfc-3161/">a
 blog by David Müller</a>.  I then found a good recipe on how to use
 over at the
 <a href="http://www.rz.uni-greifswald.de/support/dfn-pki-zertifikate/zeitstempeldienst.html">University
-of Greifswald</a>.  The OpenSSL library contain both server and tools
-to use and set up your own signing service.  See the ts(1SSL),
-tsget(1SSL) manual pages for more details.  The following shell script
-demonstrate how to extract a signed timestamp for any file on the disk
-in a Debian environment:
+of Greifswald</a>.</p>
+
+<p><a href="http://www.openssl.org/">The OpenSSL library</a> contain
+both server and tools to use and set up your own signing service.  See
+the ts(1SSL), tsget(1SSL) manual pages for more details.  The
+following shell script demonstrate how to extract a signed timestamp
+for any file on the disk in a Debian environment:</p>
 
 <p><blockquote><pre>
 #!/bin/sh
diff --git a/blog/tags/english/english.rss b/blog/tags/english/english.rss
index 42f74a7b85..75ba5fb5fd 100644
--- a/blog/tags/english/english.rss
+++ b/blog/tags/english/english.rss
@@ -34,11 +34,13 @@ few years ago as <a href="http://tools.ietf.org/html/rfc3161">RF
 3161</a>.  The mechanism is simple.  Create a hash of the file in
 question, send it to a trusted third party which add a time stamp to
 the hash and sign the result with its private key, and send back the
-signed hash + timestamp.  Anyone with the document and the signature
-can then verify that the document matches the signature by creating
-their own hash and checking the signature using the trusted third
-party public key.  There are several commercial services around
-providing such timestamping.  A quick search for
+signed hash + timestamp.  Both email, FTP and HTTP can be used to
+request such signature, depending on what is provided by the service
+used. Anyone with the document and the signature can then verify that
+the document matches the signature by creating their own hash and
+checking the signature using the trusted third party public key.
+There are several commercial services around providing such
+timestamping.  A quick search for
 "<a href="https://duckduckgo.com/?q=rfc+3161+service">rfc 3161
 service</a>" pointed me to at least
 <a href="https://www.digistamp.com/technical/how-a-digital-time-stamp-works/">DigiStamp</a>,
@@ -53,16 +55,18 @@ trusted third party is not compromised.</p>
 timestamp services available for everyone.  I've been looking for one
 for a while now. But yesterday I found one over at
 <a href="https://www.pki.dfn.de/zeitstempeldienst/">Deutches
-Forschungsnetz</a>mentioned in
+Forschungsnetz</a> mentioned in
 <a href="http://www.d-mueller.de/blog/dealing-with-trusted-timestamps-in-php-rfc-3161/">a
 blog by David Müller</a>.  I then found a good recipe on how to use
 over at the
 <a href="http://www.rz.uni-greifswald.de/support/dfn-pki-zertifikate/zeitstempeldienst.html">University
-of Greifswald</a>.  The OpenSSL library contain both server and tools
-to use and set up your own signing service.  See the ts(1SSL),
-tsget(1SSL) manual pages for more details.  The following shell script
-demonstrate how to extract a signed timestamp for any file on the disk
-in a Debian environment:
+of Greifswald</a>.</p>
+
+<p><a href="http://www.openssl.org/">The OpenSSL library</a> contain
+both server and tools to use and set up your own signing service.  See
+the ts(1SSL), tsget(1SSL) manual pages for more details.  The
+following shell script demonstrate how to extract a signed timestamp
+for any file on the disk in a Debian environment:</p>
 
 <p><blockquote><pre>
 #!/bin/sh
diff --git a/blog/tags/english/index.html b/blog/tags/english/index.html
index 518eec2802..1fa48e2a87 100644
--- a/blog/tags/english/index.html
+++ b/blog/tags/english/index.html
@@ -51,11 +51,13 @@ few years ago as RFC
 3161.  The mechanism is simple.  Create a hash of the file in
 question, send it to a trusted third party which add a time stamp to
 the hash and sign the result with its private key, and send back the
-signed hash + timestamp.  Anyone with the document and the signature
-can then verify that the document matches the signature by creating
-their own hash and checking the signature using the trusted third
-party public key.  There are several commercial services around
-providing such timestamping.  A quick search for
+signed hash + timestamp.  Both email, FTP and HTTP can be used to
+request such signature, depending on what is provided by the service
+used. Anyone with the document and the signature can then verify that
+the document matches the signature by creating their own hash and
+checking the signature using the trusted third party public key.
+There are several commercial services around providing such
+timestamping.  A quick search for
 "rfc 3161
 service" pointed me to at least
 DigiStamp,
@@ -70,16 +72,18 @@ trusted third party is not compromised.

timestamp services available for everyone. I've been looking for one for a while now. But yesterday I found one over at Deutches -Forschungsnetzmentioned in +Forschungsnetz mentioned in a blog by David Müller. I then found a good recipe on how to use over at the University -of Greifswald. The OpenSSL library contain both server and tools -to use and set up your own signing service. See the ts(1SSL), -tsget(1SSL) manual pages for more details. The following shell script -demonstrate how to extract a signed timestamp for any file on the disk -in a Debian environment: +of Greifswald.

+ +

The OpenSSL library contain +both server and tools to use and set up your own signing service. See +the ts(1SSL), tsget(1SSL) manual pages for more details. The +following shell script demonstrate how to extract a signed timestamp +for any file on the disk in a Debian environment:

 #!/bin/sh
diff --git a/blog/tags/sikkerhet/index.html b/blog/tags/sikkerhet/index.html
index d2fae3c7d1..431995a287 100644
--- a/blog/tags/sikkerhet/index.html
+++ b/blog/tags/sikkerhet/index.html
@@ -51,11 +51,13 @@ few years ago as RFC
 3161.  The mechanism is simple.  Create a hash of the file in
 question, send it to a trusted third party which add a time stamp to
 the hash and sign the result with its private key, and send back the
-signed hash + timestamp.  Anyone with the document and the signature
-can then verify that the document matches the signature by creating
-their own hash and checking the signature using the trusted third
-party public key.  There are several commercial services around
-providing such timestamping.  A quick search for
+signed hash + timestamp.  Both email, FTP and HTTP can be used to
+request such signature, depending on what is provided by the service
+used. Anyone with the document and the signature can then verify that
+the document matches the signature by creating their own hash and
+checking the signature using the trusted third party public key.
+There are several commercial services around providing such
+timestamping.  A quick search for
 "rfc 3161
 service" pointed me to at least
 DigiStamp,
@@ -70,16 +72,18 @@ trusted third party is not compromised.

timestamp services available for everyone. I've been looking for one for a while now. But yesterday I found one over at Deutches -Forschungsnetzmentioned in +Forschungsnetz mentioned in a blog by David Müller. I then found a good recipe on how to use over at the University -of Greifswald. The OpenSSL library contain both server and tools -to use and set up your own signing service. See the ts(1SSL), -tsget(1SSL) manual pages for more details. The following shell script -demonstrate how to extract a signed timestamp for any file on the disk -in a Debian environment: +of Greifswald.

+ +

The OpenSSL library contain +both server and tools to use and set up your own signing service. See +the ts(1SSL), tsget(1SSL) manual pages for more details. The +following shell script demonstrate how to extract a signed timestamp +for any file on the disk in a Debian environment:

 #!/bin/sh
diff --git a/blog/tags/sikkerhet/sikkerhet.rss b/blog/tags/sikkerhet/sikkerhet.rss
index 7edc63195a..28c750c569 100644
--- a/blog/tags/sikkerhet/sikkerhet.rss
+++ b/blog/tags/sikkerhet/sikkerhet.rss
@@ -34,11 +34,13 @@ few years ago as <a href="http://tools.ietf.org/html/rfc3161">RF
 3161</a>.  The mechanism is simple.  Create a hash of the file in
 question, send it to a trusted third party which add a time stamp to
 the hash and sign the result with its private key, and send back the
-signed hash + timestamp.  Anyone with the document and the signature
-can then verify that the document matches the signature by creating
-their own hash and checking the signature using the trusted third
-party public key.  There are several commercial services around
-providing such timestamping.  A quick search for
+signed hash + timestamp.  Both email, FTP and HTTP can be used to
+request such signature, depending on what is provided by the service
+used. Anyone with the document and the signature can then verify that
+the document matches the signature by creating their own hash and
+checking the signature using the trusted third party public key.
+There are several commercial services around providing such
+timestamping.  A quick search for
 "<a href="https://duckduckgo.com/?q=rfc+3161+service">rfc 3161
 service</a>" pointed me to at least
 <a href="https://www.digistamp.com/technical/how-a-digital-time-stamp-works/">DigiStamp</a>,
@@ -53,16 +55,18 @@ trusted third party is not compromised.</p>
 timestamp services available for everyone.  I've been looking for one
 for a while now. But yesterday I found one over at
 <a href="https://www.pki.dfn.de/zeitstempeldienst/">Deutches
-Forschungsnetz</a>mentioned in
+Forschungsnetz</a> mentioned in
 <a href="http://www.d-mueller.de/blog/dealing-with-trusted-timestamps-in-php-rfc-3161/">a
 blog by David Müller</a>.  I then found a good recipe on how to use
 over at the
 <a href="http://www.rz.uni-greifswald.de/support/dfn-pki-zertifikate/zeitstempeldienst.html">University
-of Greifswald</a>.  The OpenSSL library contain both server and tools
-to use and set up your own signing service.  See the ts(1SSL),
-tsget(1SSL) manual pages for more details.  The following shell script
-demonstrate how to extract a signed timestamp for any file on the disk
-in a Debian environment:
+of Greifswald</a>.</p>
+
+<p><a href="http://www.openssl.org/">The OpenSSL library</a> contain
+both server and tools to use and set up your own signing service.  See
+the ts(1SSL), tsget(1SSL) manual pages for more details.  The
+following shell script demonstrate how to extract a signed timestamp
+for any file on the disk in a Debian environment:</p>
 
 <p><blockquote><pre>
 #!/bin/sh
diff --git a/blog/tags/sitesummary/index.html b/blog/tags/sitesummary/index.html
index 4566f77821..aa29e549a2 100644
--- a/blog/tags/sitesummary/index.html
+++ b/blog/tags/sitesummary/index.html
@@ -263,7 +263,7 @@ everything is taken care of.

  • February (3)
  • -
  • March (5)
  • +
  • March (6)
  • @@ -454,7 +454,7 @@ everything is taken care of.

  • drivstoffpriser (4)
  • -
  • english (239)
  • +
  • english (240)
  • fiksgatami (21)
  • @@ -508,7 +508,7 @@ everything is taken care of.

  • scraperwiki (2)
  • -
  • sikkerhet (35)
  • +
  • sikkerhet (36)
  • sitesummary (4)
  • diff --git a/blog/tags/skepsis/index.html b/blog/tags/skepsis/index.html index 55e4a35cdc..c7beea5c81 100644 --- a/blog/tags/skepsis/index.html +++ b/blog/tags/skepsis/index.html @@ -396,7 +396,7 @@ skyskrapere. Takke meg til en tur til mÃ¥nen.

  • February (3)
  • -
  • March (5)
  • +
  • March (6)
  • @@ -587,7 +587,7 @@ skyskrapere. Takke meg til en tur til mÃ¥nen.

  • drivstoffpriser (4)
  • -
  • english (239)
  • +
  • english (240)
  • fiksgatami (21)
  • @@ -641,7 +641,7 @@ skyskrapere. Takke meg til en tur til mÃ¥nen.

  • scraperwiki (2)
  • -
  • sikkerhet (35)
  • +
  • sikkerhet (36)
  • sitesummary (4)
  • diff --git a/blog/tags/standard/index.html b/blog/tags/standard/index.html index ff0a70f15f..06a9cdcf33 100644 --- a/blog/tags/standard/index.html +++ b/blog/tags/standard/index.html @@ -3638,7 +3638,7 @@ Kjenner kun til ufullstendige løsninger for slikt.

  • February (3)
  • -
  • March (5)
  • +
  • March (6)
  • @@ -3829,7 +3829,7 @@ Kjenner kun til ufullstendige løsninger for slikt.

  • drivstoffpriser (4)
  • -
  • english (239)
  • +
  • english (240)
  • fiksgatami (21)
  • @@ -3883,7 +3883,7 @@ Kjenner kun til ufullstendige løsninger for slikt.

  • scraperwiki (2)
  • -
  • sikkerhet (35)
  • +
  • sikkerhet (36)
  • sitesummary (4)
  • diff --git a/blog/tags/stavekontroll/index.html b/blog/tags/stavekontroll/index.html index 3006be16d3..adf73cd9e5 100644 --- a/blog/tags/stavekontroll/index.html +++ b/blog/tags/stavekontroll/index.html @@ -242,7 +242,7 @@ stavekontrollen.

  • February (3)
  • -
  • March (5)
  • +
  • March (6)
  • @@ -433,7 +433,7 @@ stavekontrollen.

  • drivstoffpriser (4)
  • -
  • english (239)
  • +
  • english (240)
  • fiksgatami (21)
  • @@ -487,7 +487,7 @@ stavekontrollen.

  • scraperwiki (2)
  • -
  • sikkerhet (35)
  • +
  • sikkerhet (36)
  • sitesummary (4)
  • diff --git a/blog/tags/stortinget/index.html b/blog/tags/stortinget/index.html index 8855e3616a..34f01706db 100644 --- a/blog/tags/stortinget/index.html +++ b/blog/tags/stortinget/index.html @@ -839,7 +839,7 @@ at vi i NUUG har fÃ¥tt operativ en norsk utgave av
  • February (3)
  • -
  • March (5)
  • +
  • March (6)
  • @@ -1030,7 +1030,7 @@ at vi i NUUG har fÃ¥tt operativ en norsk utgave av
  • drivstoffpriser (4)
  • -
  • english (239)
  • +
  • english (240)
  • fiksgatami (21)
  • @@ -1084,7 +1084,7 @@ at vi i NUUG har fÃ¥tt operativ en norsk utgave av
  • scraperwiki (2)
  • -
  • sikkerhet (35)
  • +
  • sikkerhet (36)
  • sitesummary (4)
  • diff --git a/blog/tags/surveillance/index.html b/blog/tags/surveillance/index.html index aade942364..79b3cf6f67 100644 --- a/blog/tags/surveillance/index.html +++ b/blog/tags/surveillance/index.html @@ -1562,7 +1562,7 @@ automatisk over i spesialkartet.

  • February (3)
  • -
  • March (5)
  • +
  • March (6)
  • @@ -1753,7 +1753,7 @@ automatisk over i spesialkartet.

  • drivstoffpriser (4)
  • -
  • english (239)
  • +
  • english (240)
  • fiksgatami (21)
  • @@ -1807,7 +1807,7 @@ automatisk over i spesialkartet.

  • scraperwiki (2)
  • -
  • sikkerhet (35)
  • +
  • sikkerhet (36)
  • sitesummary (4)
  • diff --git a/blog/tags/sysadmin/index.html b/blog/tags/sysadmin/index.html index 274e4d8011..e8a1d7ae65 100644 --- a/blog/tags/sysadmin/index.html +++ b/blog/tags/sysadmin/index.html @@ -95,7 +95,7 @@ and DHCP updates I wanted to do.

  • February (3)
  • -
  • March (5)
  • +
  • March (6)
  • @@ -286,7 +286,7 @@ and DHCP updates I wanted to do.

  • drivstoffpriser (4)
  • -
  • english (239)
  • +
  • english (240)
  • fiksgatami (21)
  • @@ -340,7 +340,7 @@ and DHCP updates I wanted to do.

  • scraperwiki (2)
  • -
  • sikkerhet (35)
  • +
  • sikkerhet (36)
  • sitesummary (4)
  • diff --git a/blog/tags/valg/index.html b/blog/tags/valg/index.html index d6de41c6b8..1133fe8f23 100644 --- a/blog/tags/valg/index.html +++ b/blog/tags/valg/index.html @@ -945,7 +945,7 @@ inneholdt i Iran hvis de ikke hadde hemmelige valg?

  • February (3)
  • -
  • March (5)
  • +
  • March (6)
  • @@ -1136,7 +1136,7 @@ inneholdt i Iran hvis de ikke hadde hemmelige valg?

  • drivstoffpriser (4)
  • -
  • english (239)
  • +
  • english (240)
  • fiksgatami (21)
  • @@ -1190,7 +1190,7 @@ inneholdt i Iran hvis de ikke hadde hemmelige valg?

  • scraperwiki (2)
  • -
  • sikkerhet (35)
  • +
  • sikkerhet (36)
  • sitesummary (4)
  • diff --git a/blog/tags/video/index.html b/blog/tags/video/index.html index fbdac2f15a..03583a363d 100644 --- a/blog/tags/video/index.html +++ b/blog/tags/video/index.html @@ -44,7 +44,7 @@ and genisoimage, but these days I use the marvellous python library and program python-dvdvideo written by Bastian Blank. It is -in Debian +in Debian already and the binary package name is python3-dvdvideo. Instead of trying to read every block from the DVD, it parses the file structure and figure out which block on the DVD is actually in used, @@ -3168,7 +3168,7 @@ larger stick as well.

  • February (3)
  • -
  • March (5)
  • +
  • March (6)
  • @@ -3359,7 +3359,7 @@ larger stick as well.

  • drivstoffpriser (4)
  • -
  • english (239)
  • +
  • english (240)
  • fiksgatami (21)
  • @@ -3413,7 +3413,7 @@ larger stick as well.

  • scraperwiki (2)
  • -
  • sikkerhet (35)
  • +
  • sikkerhet (36)
  • sitesummary (4)
  • diff --git a/blog/tags/video/video.rss b/blog/tags/video/video.rss index bab5c83796..bf19041690 100644 --- a/blog/tags/video/video.rss +++ b/blog/tags/video/video.rss @@ -27,7 +27,7 @@ and genisoimage</a>, but these days I use the marvellous python library and program <a href="http://bblank.thinkmo.de/blog/new-software-python-dvdvideo">python-dvdvideo</a> written by Bastian Blank. It is -<a href"http://packages.qa.debian.org/p/python-dvdvideo.html">in Debian +<a href="http://packages.qa.debian.org/p/python-dvdvideo.html">in Debian already</a> and the binary package name is python3-dvdvideo. Instead of trying to read every block from the DVD, it parses the file structure and figure out which block on the DVD is actually in used, diff --git a/blog/tags/vitenskap/index.html b/blog/tags/vitenskap/index.html index c0fc8f4608..72204c1a9c 100644 --- a/blog/tags/vitenskap/index.html +++ b/blog/tags/vitenskap/index.html @@ -399,7 +399,7 @@ skyskrapere. Takke meg til en tur til mÃ¥nen.

  • February (3)
  • -
  • March (5)
  • +
  • March (6)
  • @@ -590,7 +590,7 @@ skyskrapere. Takke meg til en tur til mÃ¥nen.

  • drivstoffpriser (4)
  • -
  • english (239)
  • +
  • english (240)
  • fiksgatami (21)
  • @@ -644,7 +644,7 @@ skyskrapere. Takke meg til en tur til mÃ¥nen.

  • scraperwiki (2)
  • -
  • sikkerhet (35)
  • +
  • sikkerhet (36)
  • sitesummary (4)
  • diff --git a/blog/tags/web/index.html b/blog/tags/web/index.html index cf8691320a..70538b37f2 100644 --- a/blog/tags/web/index.html +++ b/blog/tags/web/index.html @@ -2274,7 +2274,7 @@ be the only one fitting our needs. :/

  • February (3)
  • -
  • March (5)
  • +
  • March (6)
  • @@ -2465,7 +2465,7 @@ be the only one fitting our needs. :/

  • drivstoffpriser (4)
  • -
  • english (239)
  • +
  • english (240)
  • fiksgatami (21)
  • @@ -2519,7 +2519,7 @@ be the only one fitting our needs. :/

  • scraperwiki (2)
  • -
  • sikkerhet (35)
  • +
  • sikkerhet (36)
  • sitesummary (4)