CCATP #472 – Bart Busschots PBS 28 – CSS Attribute Selectors & HTML Buttons

In this week’s installment of Programming By Stealth, Bart teaches us about how to change the look of HTML buttons using their CSS attributes. It’s great fun, but I have to confess we don’t actually get to the new stuff till over an hour into the show! We had so much fun going through the homework from last time that we lost track of time. I was so excited because I’d worked really hard on my homework this time and was able to actually conquer the first two parts (with some help from my friends) but I did struggle a bit with the third piece where I had to assemble them together. Anyway, we decided it’s ok if you skip ahead to the CSS parts if you like; it starts at an hour and six minutes in.

As always the full written tutorial with examples is at…

mp3 download

Dumb Question Corner: VPNs vs End-to-End Encrypted Messaging Services

Vpn diagramIn Dumb Question Corner, Steve’s Uncle Bob asked a really good question. It’s been a while since we did a dumb question so let’s review the rules. A Dumb Question qualifies for such a title if it’s something you feel like you should know the answer to, and figure everyone else must understand something you don’t. The questions are absolutely not dumb but it helps to call them that so you’ll feel ok asking them.

The second rule of Dumb Question is that ideally Allison will be able to answer them. I’ve been known to do a bit of research from time to time to figure out the answer, but in general it’s swell if it’s actually in my field of expertise. That brings us to our third rule, and it’s that you can’t ask me anything about iTunes. With that stage sent, here’s Bob’s question:

My question revolves around whether end-to-end encrypted chat programs like WhatsApp, Signal, and others are necessary if both parties already employ VPN’s? My understanding of VPN’s is that they encrypt all data between servers and mask the original IP address. That being the case, it would seem WhatsApp and other end-to-end encryption tools would be redundant. Another question stemming from this is whether both parties have to have VPN’s on their respective ends, or will it also work if just one party uses a VPN? Just something enquiring minds need to ponder to avoid Alzheimer’s.

I like this question because I knew that all of the information to answer the question was somewhere stashed away in my brain, but retrieving the right bits and assembling them properly was going to be the tricky part. Continue reading “Dumb Question Corner: VPNs vs End-to-End Encrypted Messaging Services”

Scroll to top