Using Org-Mode to Manage Configs

I've just started to use Org-Mode as a way to manage my configs. Previously I've kept my configs in a git repo and just had a post-install script to put all the configs in the right place. For now, I'm testing using Org-Mode for this purpose and I think I like the results. I have a config.org file that is arranged something like this: #+TITLE: Configs - Tangle a single block with =C-u C-c C-v t= - Tangle all blocks with =C-v C-c t= #+name: secret #+begin_src emacs-lisp :var name="", fld="" (if (string-equal fld "password") (password-store-get name) (password-store-get-field name fld)) #+end_src * tmux #+begin_src bash :noweb tangle :tangle ~/.
Read more →

Elfeed Rules!

I recently got the question- "What is the use case for elfeed?". When I get a chance to talk about my favorite software I will NEVER pass up that opportunity. Elfeed is a RSS feed reader for Emacs that I use daily and it solves a lot of problems for me. To understand how this works let's start by looking at a snippet of my feeds config. Elfeed feeds is just a list of lists where each feed is represented by (url tag1 tag2 tagN) .
Read more →

No More Lock-in

decoupling the address from the service I’ve been using gmail since it was an invite only beta. My email address has accumulated so much garbage over the years and finding important emails has become almost as difficult as determining important calls. I recently switched to Protonmail due to privacy concerns with Google’s monopoly on data. I had hoped I could use this transition to slowly shift important emails to a new address.
Read more →

A Less Than Ideal Way To Do 2-factor

probably just shouldn't use cell networks for 2-factor I have concerns with how Duo does phone two-factor authentication and think we can all learn from the way Google does it. The issue: If a user has their password compromised it’s easy to convince them to authenticate a 2-factor request without doing anything that would set off a red flag. This is due to the specific way Duo does phone call authentication.
Read more →