• Python

    Google Cloud Function To Encrypt A JSON Document With An ECC Key

    To use this function, create a Google Cloud Function that uses the encrypt_json() function in Google Cloud Console or the gcloud command-line tool. Once created the function, invoke it by sending a POST request to the function’s URL. The request body should contain the JSON document to encrypt. The response body will contain the encrypted JSON document. For example, to encrypt the JSON document my_data.json, you would use the following command: The response body will contain the encrypted JSON document. This function uses the Google Cloud KMS service to encrypt the JSON document. So make sure there’s a KMS key enabled in a project before using the function.

  • Kerio,  Unix

    Kerio Mail Server in 10 Minutes

    The good people at Kerio have been kind enough to distribute their mail server software bundled into a CentOS installation on a Virtual Machine. You can just snap it into Fusion very easily, if you want to take the Kerio Mail Server (KMS) for a ride. I can’t say I would recommend running it full time in Fusion on Mac hardware though, you might be better served installing the package installer that Kerio distributes in that case.. There is a second nice thing about the VM in that it does most of the work in setting up Kerio for you. When you download and run the VM, it immediately fires…

  • Kerio

    Kerio: Out of Office Message

    To setup an Out of Office message with Kerio Mail Server, log into the web portal to access your mail.  Then click on Settings and select Out of Office.  Move the bulleted option to I am out of office now and then type in the our of office message you’d like to use.  When finished, click on the OK button.

  • Kerio

    Kerio: Permissions

    Sometimes when you’re setting up permissions for certain folders using Microsoft Entourage, the process will fail.  If it does you can still set permissions using the web portal.  To do so, log into your webmail.  Then control-click the folder in question and click on the Access Rights… button.  Here, you will be able to define who can read, write or delete items.  Make sure that if you’re giving someone access to a folder that you don’t forget to give access to the parent folder (eg – the parent folder to INBOX is the root of your email hierarchy).  This is one of the more common mistakes we see there.