The renewal date on my .co.uk domain was nearing. I decided to make a change from 123-reg to iwantmyname. After migration, I captured the process to enable DNSSEC on the domain when using Cloudflare for DNS. For those thinking of a similar migration, I have also captured my experience of moving to iwantmyname.
I’ve been reviewing the available Hugo privacy settings.
I created a timeline visual from Elite Dangerous in-game events. Why? On the one hand, to further my Python learning and explore AWS DynamoDB. On the other hand, because I ultimately would like to provide some context to me in the game which is not present natively. By focusing on visualising a subset of the available events, I gain a foothold in parsing the game data into a database and putting an API in front of it.
In this post, I’d like to share an example of bringing to life the data returned by an API. One PowerShell example takes the output of
Get-Process to create a JSON representation of process IDs and their network connections.
In this post, I’d like to introduce you to how I’ve used PSGraph to create visuals from code. I’ll show you how to represent the Windows DNS cache graphically. Here is an example output (click for a full size image):