|
Well you can have them plain, with yoghourt, cream, ice cream, custard ...
|
|
|
|
|
agreed. we need a Cooking forum for sure.
|
|
|
|
|
Thanks! That sounds delicious. I'll give it a go.
I think you got your steak terminology correct. It's been a long time since I moved across the pond but I do remember rump steak. It's also interesting that some cuts of meat are more popular in certain regions of the US than others. I moved from Texas to Idaho a few years ago and the selection at the local grocery store is noticeably different. For instance, tri tip roast is popular here (great for braising), but hard to find in Texas. Also, potatoes are insanely cheap!
|
|
|
|
|
That sounds so delicious.
|
|
|
|
|
Actually, if you want to impress the missus you need to do veggies as well.
Do carrots as the first try, you can't fail on those.
Take a pound of carrots and cut them into strips similar to French fries. (or use baby carrots)
Add them to a bag together with two tablespoons of butter, one tablespoon of sugar and half a teaspoon of salt, and vacuum seal it.
Sous vide for an hour at 183F or 84C.
This bag can now be used immediately or stored in a fridge for at least up to a fortnight, It's been properly pasteurized.
Just before serving, make sure the bag is warm enough so the butter is properly liquid.
Pour the liquid content into a small frying pan, and heat until all the liquid has evaporated and the sugar caramelizes,
Add the carrots and stir for another couple of minutes.
Serve.
Wrong is evil and must be defeated. - Jeff Ello
Never stop dreaming - Freddie Kruger
|
|
|
|
|
I bought a code signing certificate from a CA(such as GeoTrust etc..) long time ago and signed my application(written in C#) few years ago.
my question is: will my code signing certificate expire? will my previously signed application still get installed successfully in client machine(Windows System)?
diligent hands rule....
|
|
|
|
|
AFAIK - it will have an impact. Your certificates has a defined validity. As long as it's valid, your signature is. Once the certificate expires, your exe will go into insecure exe zone and anti-viruses might start flagging it up.
So, your previously signed application can install successfully on client system at the mercy of antivirus systems. (mostly would flag it because of expired certificate, keeping security as priority unless they have enough data in their database to confirm it is an okay executable)
|
|
|
|
|
my new goal is to install a driver program onto client machine. after it is signed and installed on client machine successfully, what will happen
after my certificate expires, will that driver program still work?
this is the question bugging me and I can not validate it now...
diligent hands rule....
|
|
|
|
|
You should go back to the authority where you purchased the certificate and review the terms with them.
That said, the 'code signing' business is a lovely racket. At regular intervals a weakness is discovered in the certificate mechanism, at which time all current owners are given a [fairly short] interval during which they must purchase a new certificate to indicate their software is 'valid'. If they fail to update their certificate, their software is invalidated.
There is little difference between you the developer and the certificate authority, and the thug with a Glock in the mini-mart wanting this week's $500.
Software Zen: delete this;
|
|
|
|
|
I looked into this a while back since I had written a winforms app I wanted to be known as safe.
I came to the same conclusions -- that it is hardly realistic with all the work you have to do plus the $$$.
But here's the really interesting thing...
You can create an installer that will install an ElectronJS complete app (or a NodeJS app) that runs natively on the user's desktop and has extended abilities and Windows will not flag that app at all. It will simply install without every complaining or making any antivirus aware.
Most users would never know the difference between the Electron app and a normal Windows app either.
So, the system is kind of broken that way too.
|
|
|
|
|
If you want your executable and installer to work after expiry, you have to sign it with a timestamp from one of the timestamp website with /tr switch before its expiry. In my case, I use timestamp.digicert.com
signtool.exe sign /tr http:
|
|
|
|
|
If it is an Authenticode certificate you can find the expiry date somewhere in the file properties, it is hard to find btw.
|
|
|
|
|
As others have pointed out, it's not that an expired cert means the signature is suddenly "no longer valid", but apps that might care to do anything about it will flag exactly that, an expired cert.
To me that ranks the same as "won't somebody PLEASE think of the children?" What did we ever do with our EXEs before anything ever got signed?
|
|
|
|
|
I don't know if that last comment was tongue-in-cheek or not, but anyway....
Well once upon a time you needed to get exe's from floppy disks (and then later CD's) from a physical software shop. Whilst yes it was possible that the exe on a floppy disk was modified by a intermediate person, you could be pretty sure that it was a genuine program (unless you lived on "sneaker-net" software)
When the internet came around you had to rely on the fact that something calling itself "Microsoft Software" really did come from Microsoft. Whilst yes, I can get a certificate and release Trojans, it's one more step I would need to do to look "trustworthy". And I'd probably have a great deal of difficulty getting a (non-self-signed) certificate calling myself "Microsoft Software"
|
|
|
|
|
harvyk0 wrote: And I'd probably have a great deal of difficulty getting a (non-self-signed) certificate calling myself "Microsoft Software" Absolutely you would, otherwise the concept of code signing would be worthless. Getting that certificate requires that the CA verify you are who you say you are.
harvyk0 wrote: Whilst yes, I can get a certificate and release Trojans, it's one more step I would need to do to look "trustworthy". Not just one more step, they make it hard for you to avoid giving your real identity to them before getting the signing certificate. If you intentionally sign bad stuff, they know where you live. Also, they can revoke your signing authority, so everything you've ever signed with that certificate is no longer valid -- users who try to install it get a certificate-revoked error -- and you can't sign anything new with it either. It takes time for revocations to filter through the system, and they are very few and far between, but they do happen.
5G -- more lies faster.
|
|
|
|
|
We use them for our software. At most you'll get a warning that the certificate has expired. Windows will not stop software running with invalid or expired certificates (at least this was the case a couple of years ago when I tested that by modifying the exe using a hex editor after signing).
To some of the others questioning code signing certificates:
They are very useful for Whitelisting applications such as AppLocker, as it allows you to trust an entire suite of applications / updated versions of software by the same vendor without needing to simply trust things based on path / file names (technically insecure unless you've got strong permissions) or hash based (where typically every file needs to be hashed and certainly every version update).
Also the comment for getting java (or variants like that) to simply run remotely without signing (or unsigned alerts), an appropriately hardened machine will prevent that from happening (talking corp environment here).
|
|
|
|
|
The old signed exe will be alright, and will work if its compatible on the machine/OS.
But you will not be able to properly sign new exes with the old certificate.
|
|
|
|
|
My system was dual boot Win10/Ubuntu.
Today I decided to expand my Ubuntu partition and delete win10 and only run win10 from VirtualBox.
1) I got Win10 installed and registered from VBox. Can't believe it worked perfectly.
2) I had to delete the old win10 partition and then resize the Linux partition to take over the entire drive.
There were tenuous moments as gparted expanded / copied the partition.
I rebooted and it worked.
Can't believe it when tech works!!
|
|
|
|
|
I know the feeling - I've used AOMEI Partition Assistant (the free version) to change the size of my boot partition, and ... it just worked, even with windows 10 running.
I had a good backup, but ... I had my fingers crossed when I pushed the "go for it" button.
Impressive stuff, technology!
"I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
"Common sense is so rare these days, it should be classified as a super power" - Random T-shirt
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
OriginalGriff wrote: I had a good backup, but ... I had my fingers crossed when I pushed the "go for it" button.
That's exactly how I felt when I rebooted the first time.
I had read the warnings that "sometimes grub won't find the partition and I was scared.
Glad you had success too! it's a great feeling.
|
|
|
|
|
I think I'm 3 for 4, several just worked ( gparted ) one damaged the ( NTFS ) partition. ( NOT as badly as checkdisk has done on several times. ) That was on a "backup" machine, so no huhu.
|
|
|
|
|
You are a real influencer!
(and a daredevil)
|
|
|
|
|
RickZeeland wrote: You are a real influencer!
(and a daredevil)
Thanks, I really was hoping to encourage others toward success, because when I finally decided to go for it and I pulled the trigger I thought, "I'll probably be working on getting my system to boot all day long, but I guess that's what computers are all about".
It's very encouraging to have something actually work.
|
|
|
|
|
If you want a real adrenaline rush, move and shrink your root partition with Gparted.
I've done it a couple of times and survived.
Cheers,
Peter
Software rusts. Simon Stephenson, ca 1994. So does this signature. me, 2012
|
|
|
|
|
Peter_in_2780 wrote: move and shrink your root partition with Gparted.
Yeah, sounds too scary for me.
Glad to hear it worked out for you.
|
|
|
|