Security

Secure access to remote systems

Author: Adrian Jackson
Posted: 5 Sep 2016 | 10:35

06/09/16: As pointed out by my colleague Stephen in the comments after this post, the way to solve most of these issues is to tunnel the key authentication and therefore bypass the need to have private keys anywhere but on my local machine.  I'm always learning :)

Password vs key

Having to remember a range of passwords for systems that I don't use regularly is hard. 

You can use a password manager, but that only helps if I'm only ever trying to log in from my own laptop. If I have to log in from someone else's machine for any reason then I'd need to know the password.

Securely citing datasets

Author: Guest blogger
Posted: 22 Aug 2013 | 14:50

This post was written by Adrian Mouat, a former EPCC employee who is now an independent software consultant.

Citing a paper is a reasonably straightforward and well-defined task; just give a reference to the author and the publication you found the paper in and you're pretty much there. Anyone else who wants to look up the reference just has to find the publication and they should see exactly the same text you saw.

Unfortunately, citing datasets is not as simple, at least not if you want the security of knowing that readers who follow the citation will find exactly the same data you used.

Blog Archive