iljitsch.com

topics: BGP / IPv6 / more · settings · b&w · my business: inet⁶ consult · Twitter · Mastodon · LinkedIn · email · 🇺🇸 🇳🇱

Hi, I'm Iljitsch van Beijnum. Here on iljitsch.com I publish articles and post links about a range of topics.

Also have a look at my business web site inet⁶ consult.

Review: Epson V370 Photo scanner

I started taking photos in the 1980s. I still have a bunch of black-and-white negatives that I developed myself, but never got them printed. In addition to that, I have color photos with their negatives and slides. The past years, I've been looking for a way to digitize all of these. The number of photos isn't huge, maybe a few hundred, but having a service do it at 50 cents or so quickly adds up. Turns out that some flatbed scanners have a transparency attachment so you can scan negatives and slides. The Epson Perfection V370 Photo scanner has a transparency mode built in. It gets pretty good reviews and only costs about € 80 or $100. So I got one.

Read the article - posted 2014-05-17

Understanding old Nikon lenses: AI, AI-S, AF and AF-S

If you have any interest at all in using older Nikon lenses, you probably have some understanding of the difference between non-AI, AI, AI-S, AF and AF-S lenses. The trouble is that places on the web that explain the differences easily get lost in the details. This article is intended to serve as a slightly easier to digest version of the story.

Read the article - posted 2014-05-08

Nikon and Apple apply radically different color management to photos

The other day I had a discussion about whether to use the "standard" sRGB color space or a larger color space for my digital photos.

Full article / permalink - posted 2014-05-04

→ Inspiring words from engineer (and astronaut) Neil Armstrong

The video is 2 minutes long.

Permalink - posted 2014-04-30

Stoomtrein Goes-Borsele

Image link - posted 2014-04-20 in

Should we simply invalidate ALL pre-heartbleed certificates?

Reading Bruce Schneier's blogpost on the heartbleed bug:

I'm hearing that the CAs are completely clogged, trying to reissue so many new certificates. And I'm not sure we have anything close to the infrastructure necessary to revoke half a million certificates.

Wouldn't it make sense to simply invalidate update SSL implementations to reject all certificates that predate the discovery of the heartbleed vulnerability? Even if all the the potentially compromised certs are added to revocation lists, most clients don't check for revoked certificates, leaving a huge opportunity for man-in-the-middle attacks using the compromised certificates.

Permalink - posted 2014-04-18

older posts - newer posts

Search for:
RSS feed

Archives: 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020, 2021, 2022, 2023, 2024, 2025