From 7cdaa8b30fcd8ab333d11719dc4b280b28347a71 Mon Sep 17 00:00:00 2001 From: Kai Stevenson Date: Sat, 8 Oct 2022 18:40:34 -0700 Subject: set up PHP --- .DS_Store | Bin 0 -> 6148 bytes background.jpg | Bin 34982 -> 0 bytes etc/index.html | 12 ----------- etc/index.php | 12 +++++++++++ favicon.ico | Bin 4286 -> 0 bytes footer.php | 2 ++ head.php | 12 +++++++++++ header.php | 7 +++++++ images/favicon.ico | Bin 0 -> 4286 bytes images/roly-saynotoweb3.gif | Bin 0 -> 483 bytes index.html | 34 ------------------------------ index.php | 29 ++++++++++++++++++++++++++ music/index.html | 13 ------------ music/index.php | 13 ++++++++++++ photography/index.html | 12 ----------- photography/index.php | 12 +++++++++++ programming/index.html | 12 ----------- programming/index.php | 12 +++++++++++ roly-saynotoweb3.gif | Bin 483 -> 0 bytes updatesite.command | 4 ++-- writing/cryptography.html | 49 -------------------------------------------- writing/cryptography.php | 49 ++++++++++++++++++++++++++++++++++++++++++++ writing/index.html | 19 ----------------- writing/index.php | 15 ++++++++++++++ 24 files changed, 165 insertions(+), 153 deletions(-) create mode 100644 .DS_Store delete mode 100644 background.jpg delete mode 100644 etc/index.html create mode 100644 etc/index.php delete mode 100644 favicon.ico create mode 100644 footer.php create mode 100644 head.php create mode 100644 header.php create mode 100644 images/favicon.ico create mode 100644 images/roly-saynotoweb3.gif delete mode 100644 index.html create mode 100644 index.php delete mode 100644 music/index.html create mode 100644 music/index.php delete mode 100644 photography/index.html create mode 100644 photography/index.php delete mode 100644 programming/index.html create mode 100644 programming/index.php delete mode 100644 roly-saynotoweb3.gif delete mode 100644 writing/cryptography.html create mode 100644 writing/cryptography.php delete mode 100644 writing/index.html create mode 100644 writing/index.php diff --git a/.DS_Store b/.DS_Store new file mode 100644 index 0000000..5f5f4c2 Binary files /dev/null and b/.DS_Store differ diff --git a/background.jpg b/background.jpg deleted file mode 100644 index a57f485..0000000 Binary files a/background.jpg and /dev/null differ diff --git a/etc/index.html b/etc/index.html deleted file mode 100644 index fd6e3c1..0000000 --- a/etc/index.html +++ /dev/null @@ -1,12 +0,0 @@ - - - - - - -
-

Etc | [Back]

-

There's nothing here. -

-
- \ No newline at end of file diff --git a/etc/index.php b/etc/index.php new file mode 100644 index 0000000..fd6e3c1 --- /dev/null +++ b/etc/index.php @@ -0,0 +1,12 @@ + + + + + + +
+

Etc | [Back]

+

There's nothing here. +

+
+ \ No newline at end of file diff --git a/favicon.ico b/favicon.ico deleted file mode 100644 index d858211..0000000 Binary files a/favicon.ico and /dev/null differ diff --git a/footer.php b/footer.php new file mode 100644 index 0000000..6b9e15f --- /dev/null +++ b/footer.php @@ -0,0 +1,2 @@ + + \ No newline at end of file diff --git a/head.php b/head.php new file mode 100644 index 0000000..b6c2d42 --- /dev/null +++ b/head.php @@ -0,0 +1,12 @@ + + + + + + + + +
\ No newline at end of file diff --git a/header.php b/header.php new file mode 100644 index 0000000..f4096c0 --- /dev/null +++ b/header.php @@ -0,0 +1,7 @@ + +

+ +

| [Back]

+ +

| [Back]

+ \ No newline at end of file diff --git a/images/favicon.ico b/images/favicon.ico new file mode 100644 index 0000000..d858211 Binary files /dev/null and b/images/favicon.ico differ diff --git a/images/roly-saynotoweb3.gif b/images/roly-saynotoweb3.gif new file mode 100644 index 0000000..4f5a2f1 Binary files /dev/null and b/images/roly-saynotoweb3.gif differ diff --git a/index.html b/index.html deleted file mode 100644 index a0a85bd..0000000 --- a/index.html +++ /dev/null @@ -1,34 +0,0 @@ - - - - - - -
-

Hello, I'm Kai!

-

This is my Web site for cool things, like my programming, music, writing, photography, and anything else I - think of. - I'm a social sciences student at UVic, though I'm also passionate about technology. I also have another - website at - kaistevenson.com, which takes itself a little more seriously. You can also email me at kai@kaistevenson.com. -

- - -
- \ No newline at end of file diff --git a/index.php b/index.php new file mode 100644 index 0000000..4bc28fb --- /dev/null +++ b/index.php @@ -0,0 +1,29 @@ + +

This is my Web site for cool things, like my programming, music, writing, photography, and anything else I + think of. + I'm a social sciences student at UVic, though I'm also passionate about technology. I also have another + website at + kaistevenson.com, if you don't like static-ish sites :(. You can email me at kai@kaistevenson.com. +

+ + \ No newline at end of file diff --git a/music/index.html b/music/index.html deleted file mode 100644 index e4bacdb..0000000 --- a/music/index.html +++ /dev/null @@ -1,13 +0,0 @@ - - - - - - -
-

Music | [Back]

-

I haven't recorded anything yet. If you like jazz piano improv, you could check back a little later and there - might be some here. -

-
- \ No newline at end of file diff --git a/music/index.php b/music/index.php new file mode 100644 index 0000000..e4bacdb --- /dev/null +++ b/music/index.php @@ -0,0 +1,13 @@ + + + + + + +
+

Music | [Back]

+

I haven't recorded anything yet. If you like jazz piano improv, you could check back a little later and there + might be some here. +

+
+ \ No newline at end of file diff --git a/photography/index.html b/photography/index.html deleted file mode 100644 index be57783..0000000 --- a/photography/index.html +++ /dev/null @@ -1,12 +0,0 @@ - - - - - - -
-

Photography | [Back]

-

There's nothing here, yet. -

-
- \ No newline at end of file diff --git a/photography/index.php b/photography/index.php new file mode 100644 index 0000000..be57783 --- /dev/null +++ b/photography/index.php @@ -0,0 +1,12 @@ + + + + + + +
+

Photography | [Back]

+

There's nothing here, yet. +

+
+ \ No newline at end of file diff --git a/programming/index.html b/programming/index.html deleted file mode 100644 index 86b2be2..0000000 --- a/programming/index.html +++ /dev/null @@ -1,12 +0,0 @@ - - - - - - -
-

Programming | [Back]

-

There's nothing here, yet, but some things I have programmed are available on github.com/kaistevenson. -

-
- \ No newline at end of file diff --git a/programming/index.php b/programming/index.php new file mode 100644 index 0000000..86b2be2 --- /dev/null +++ b/programming/index.php @@ -0,0 +1,12 @@ + + + + + + +
+

Programming | [Back]

+

There's nothing here, yet, but some things I have programmed are available on github.com/kaistevenson. +

+
+ \ No newline at end of file diff --git a/roly-saynotoweb3.gif b/roly-saynotoweb3.gif deleted file mode 100644 index 4f5a2f1..0000000 Binary files a/roly-saynotoweb3.gif and /dev/null differ diff --git a/updatesite.command b/updatesite.command index 720b565..7b6ff9f 100755 --- a/updatesite.command +++ b/updatesite.command @@ -1,9 +1,9 @@ +rsync -avzP --rsh=ssh ~/Web/aetherdestroyer root@covalent.aetherdestroyer.net:/var/www/ + if [ $# -eq 0 ]; then exit 0 fi - -rsync -avzP --rsh=ssh ~/Web/aetherdestroyer root@aetherdestroyer.net:/var/www/ git add . git commit -m "$1" git push diff --git a/writing/cryptography.html b/writing/cryptography.html deleted file mode 100644 index 7fb73c0..0000000 --- a/writing/cryptography.html +++ /dev/null @@ -1,49 +0,0 @@ - - - - - - -
-

Principles of Crytography for Data Security | [Back]

-

As the amount of life spent online continues to increase, a great deal of private information is naturally - being transmitted: banking details, medical records, business correspondences. Where once these exchanges of - data would have occured between a small set of individuals in a shared space, they now happen between - continents, through hundreds of servers and over complex network infrastructures. It is a system that cannot - be fully accounted for by any individual, and so the means of transmission are insecure--much like having a - letter transmitted by a series of couriers, the data is liable to be intercepted or modified. And so both - parties in the exchange take on a risk that may prohibit especially critical data from being sent. - Cryptography is the study of data obfuscation--a means of making a message readable only by some. It is the - answer to the question "when the means of transmission cannot be trusted, how can information be conveyed - securely?

-

There are two classes of encryption: symmetric and asymmetric. Symmetric encryption allows a message to be - encoded and decoded with the same piece of information, or key. The ancient Caesar cipher is an example of - this; an arbitrary number acting as the key was agreed upon by both parties, and every letter in the message - was shifted through the alphabet by that amount. It could easily be decoded by anyone who knew the key by - simply shifting the letters backward through the alphabet. Simple algorithms such as the Caesar cipher are - vulnerable to various attacks due to the patterns that they create in the ciphertext. A given letter may - always be encoded in the same way, meaning that the key could be compromised if the attacker gained access - to the plaintext and ciphertext forms of the same message. And a message could be decrypted without the key - by recognizing repeated patterns in the ciphertext representing common words. More advanced symmetric - encryption methods--like the Advanced Encryption Standard (AES) algorithm, developed for the US National - Institute of Standards and Technologies--disrupt patterns in the message to prevent these types of attacks. -

-

Symmetric encryption is an imperfect solution in the internet age. Because it requires both parties to know - the same secret key, those parties must have a secure form of communication already established. In the days - of Caesar, this key exchange could be performed confidentially by two individuals in close proximity. When - encryption is used on the internet, it cannot be assumed that the communicating parties will have had any - physical interactions--and it would be impractical to expect every new customer of an online banking service - to perform a physical key exchange. Asymmetric encryption solves this problem by removing the key exchange. - Instead of encrypting and decrypting a message with the same key, an asymmetric encryption algorithm has a - keypair, comprising a public key, used for encrypting a message, and a private key, used for decrypting a - message. The keys are so named because the private key is never shared, while the public key can be - broadcast widely.

-

Typically, it demands more processing power to encrypt and decrypt messages with an asymmetric encryption - implementation than a comparable symmetric one. For this reason, it is desirable to use symmetric encryption - for most communications. An asymmetric implementation such as the Rivest--Shamir--Adleman (RSA) system is - used to perform the key exchange. One of the devices will broadcast its public RSA key to the other, which - will respond by generating an AES key, encrypting it with that RSA key, and returning it. This method of key - exchange is secure, even if every network packet is intercepted. Once the devices share an AES key, they can - communicate with the more efficient symmetric encryption method.

-
- \ No newline at end of file diff --git a/writing/cryptography.php b/writing/cryptography.php new file mode 100644 index 0000000..7fb73c0 --- /dev/null +++ b/writing/cryptography.php @@ -0,0 +1,49 @@ + + + + + + +
+

Principles of Crytography for Data Security | [Back]

+

As the amount of life spent online continues to increase, a great deal of private information is naturally + being transmitted: banking details, medical records, business correspondences. Where once these exchanges of + data would have occured between a small set of individuals in a shared space, they now happen between + continents, through hundreds of servers and over complex network infrastructures. It is a system that cannot + be fully accounted for by any individual, and so the means of transmission are insecure--much like having a + letter transmitted by a series of couriers, the data is liable to be intercepted or modified. And so both + parties in the exchange take on a risk that may prohibit especially critical data from being sent. + Cryptography is the study of data obfuscation--a means of making a message readable only by some. It is the + answer to the question "when the means of transmission cannot be trusted, how can information be conveyed + securely?

+

There are two classes of encryption: symmetric and asymmetric. Symmetric encryption allows a message to be + encoded and decoded with the same piece of information, or key. The ancient Caesar cipher is an example of + this; an arbitrary number acting as the key was agreed upon by both parties, and every letter in the message + was shifted through the alphabet by that amount. It could easily be decoded by anyone who knew the key by + simply shifting the letters backward through the alphabet. Simple algorithms such as the Caesar cipher are + vulnerable to various attacks due to the patterns that they create in the ciphertext. A given letter may + always be encoded in the same way, meaning that the key could be compromised if the attacker gained access + to the plaintext and ciphertext forms of the same message. And a message could be decrypted without the key + by recognizing repeated patterns in the ciphertext representing common words. More advanced symmetric + encryption methods--like the Advanced Encryption Standard (AES) algorithm, developed for the US National + Institute of Standards and Technologies--disrupt patterns in the message to prevent these types of attacks. +

+

Symmetric encryption is an imperfect solution in the internet age. Because it requires both parties to know + the same secret key, those parties must have a secure form of communication already established. In the days + of Caesar, this key exchange could be performed confidentially by two individuals in close proximity. When + encryption is used on the internet, it cannot be assumed that the communicating parties will have had any + physical interactions--and it would be impractical to expect every new customer of an online banking service + to perform a physical key exchange. Asymmetric encryption solves this problem by removing the key exchange. + Instead of encrypting and decrypting a message with the same key, an asymmetric encryption algorithm has a + keypair, comprising a public key, used for encrypting a message, and a private key, used for decrypting a + message. The keys are so named because the private key is never shared, while the public key can be + broadcast widely.

+

Typically, it demands more processing power to encrypt and decrypt messages with an asymmetric encryption + implementation than a comparable symmetric one. For this reason, it is desirable to use symmetric encryption + for most communications. An asymmetric implementation such as the Rivest--Shamir--Adleman (RSA) system is + used to perform the key exchange. One of the devices will broadcast its public RSA key to the other, which + will respond by generating an AES key, encrypting it with that RSA key, and returning it. This method of key + exchange is secure, even if every network packet is intercepted. Once the devices share an AES key, they can + communicate with the more efficient symmetric encryption method.

+
+ \ No newline at end of file diff --git a/writing/index.html b/writing/index.html deleted file mode 100644 index 6ee4ec9..0000000 --- a/writing/index.html +++ /dev/null @@ -1,19 +0,0 @@ - - - - - - -
-

Writing | [Back]

-

This is the index page for my writing. Obviously, if you follow the links below, you can read things I've - written. - Whether or not you want to do that is up to you. -

- -
- \ No newline at end of file diff --git a/writing/index.php b/writing/index.php new file mode 100644 index 0000000..aab6642 --- /dev/null +++ b/writing/index.php @@ -0,0 +1,15 @@ + +

This is the index page for my writing. Obviously, if you follow the links below, you can read things I've + written. + Whether or not you want to do that is up to you. +

+ + \ No newline at end of file -- cgit v1.2.3-70-g09d2