The workflow for updating version numbers and doing git/GitHub/npm releases is far too complex to easily remember when you aren’t doing it very often. This post is a reminder of the various steps.
Generate certificates for Node-RED that are trusted by all modern browsers. This will let you access Node-RED (and other services) over an encrypted HTTPS link.
Node-RED is increasingly used in situations that require reasonable security. Up to now, however, the information required to secure it correctly has been fragmented. This article aims to give an end-to-end outline to enable anyone to secure their installation.
Drayton are a very widely used manufacturer of heating controls. They make the “Wiser” control system which is low cost and easily fitted. This article shows you how to use Node-RED to query and control the system.
Having just brought a Google Home, I’ve quickly realised that, although Google are supposedly fairly open about allowing people to develop for it, there are still far too many limitations. To try and get round these, I’ve been looking at automation tools. In this article, I will list some of the key tools and their strengths and weaknesses.
📖 Posts | 📎 Blogging, Development | 🔖 security, security threats, threat management, vulnerabilities, web
A somewhat random collection of code for Hugo so that I don’t have to keep looking things up all over the Internet.
Many of us spend most of our work time in a few applications such as Outlook (email) and a web browser. This example macro for Microsoft Outlook will let you add a button to the Outlook Ribbon that will open a specific website URL.
Outlook has a custom URL protocol that allows interaction with different elements such as folders, mail and calendar items and contacts, Since Outlook 2007, this has been restricted for use only within Outlook itself but there are some tremendous opportunities for use from simple web systems. This post explains how to turn it on, even for Outlook 2013 (Office 365 version). It also gives pointers to other articles on how to use the protocol.