I just created a PGP/GPG key signing policy.
After holding a small but fun Key Signing Party in Copenhagen yesterday, I decided that it would probably be a good idea to document my own policy when it comes to when and how I will sign other people’s keys.
My main motivations for doing this are that I want to expand the web of trust and I want to spread the use of GPG among my friends, relatives and social media contacts.
My requirements for signing your key aren’t that strict. Basically if I know you well, I will sign your key. If I don’t know you that well, you can send me color scan of your Danish passport or driver’s license and I’ll sign your key after verifying the information.
I recently discovered that my old GPG key had expired (truthfully I hardly ever used it). And of course I had forgotten to generate a revocation certificate back then. So I generated a new key. This blog post is mainly just to verify that the key I published below does, in fact, belong to me.
If you want to add me to your “web of trust” by signing the key for me, I would be really happy. Let me know if you do!
Here’s the entire key, which has fingerprint 78189E24005B09330CF62536416C5A0DD9FA2EE5.You might want to check the MIT Key Server for a version with more trust signatures :)
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2.0.22 (MingW32)
-----END PGP PUBLIC KEY BLOCK-----
Edit: I just managed to revoke my old cert, so the one above is now the only one active for my email address.
I enabled BitLocker™ encryption on one of my drives today and couldn’t seem to find a way of checking the status of the process. It turned out to be relatively easy.
Start a PowerShell command window as Administrator and enter the following command:
manage-bde -status L:
This will output a small hunk of information about the encryption status of the drive you selected.
C:\Windows\system32> manage-bde -status l:
BitLocker Drive Encryption: Configuration Tool version 6.3.9600
Copyright (C) 2013 Microsoft Corporation. All rights reserved.
Volume L: [iSCSI]
Size: 926,87 GB
BitLocker Version: 2.0
Conversion Status: Encryption in Progress
Percentage Encrypted: 12,7%
Encryption Method: AES 128
Protection Status: Protection Off
Lock Status: Unlocked
Identification Field: Unknown
Automatic Unlock: Disabled
Just thought I'd put this here for my own future reference.
Update: *dough* I should have just checked my System Tray for this little fellow:
Clicking it gave me this neat little window:
Oh well. It’s always fun playing around with PowerShell I guess.
I recently swapped out my iPad for a Surface 2 and must admit I haven’t looked back once. I stumbled across a neat little trick that allows me to use the Play To functionality to stream content from the Surface 2 to my XBMC media center (which is running on a projector in my living room).
The XBMC Media Center shows up under Play Devices as “Not Windows certified”
Playing to non-certified devices is still possible, however. This is done simply by adding a registry key. To do this, go to your start screen, type regedit and hit enter on the search result (regedit.exe). Now navigate to the key
If that key doesn’t exist just create it. Then create a new 32-bit DWORD value called ShowNonCertifiedDevices and set its value to 1.
Now if you try to Play To again you should see your device on the list.
Now you can stream videos from your Surface 2 straight to your DLNA-enabled TV or Media Center device. Awesome right?
I finally succeeded in getting the Cisco AnyConnect VPN client to work on my Windows 8 home PC. I couldn't get the ActiveX or JAVA-based versions to work, so after logging in to the VPN portal, I got an option do download the software and install it manually.
However, once I tried to connect, I got the following error:
To solve this, open the Registry Editor and go to [HKLM\SYSTEM\CurrentControlSet\Services\vpna] and modify the DisplayName key so that it only contains the text
Cisco AnyConnect Secure Mobility Client Virtual Miniport Adapter for Windows x64
Once this is done, you're all set and the VPN client should work just fine.