This post is to document my steps to use external Windows keyboard on Mac with custom key mapping. Background Apple’s magic keyboard does not support…
Tuning the garbage collector is the most important thing that can be done to improve the performance of a Java application. GC is typically caused…
This is not for Linux snobs, but rather for those who are stuck with a Windows work laptop, have to deal with Linux on a…
This article explains how two most common authentication mechanisms (NTLM and Kerberos) work. Both authentication protocols are based on symmetric key cryptography. The protocols themselves…
This article gives a very brief high-level introduction to PAM (Pluggable Authentication Module) and SSPI (Security Support Provider Interface) as authentication frameworks in Linux and…