Sun 30 May 2021

A visit to Staelduinse Bos

Today we went to a forest close to where we live: Staelduinse Bos. On our way we saw a mute swan couple with young so I stopped my bike and took a photo.

Female mute swan, Cygnus olor, with young
Female mute swan, Cygnus olor, with young.

Before we entered the forest we had a short break in "De Bosrand" (Literally: Edge of the forest), a restaurant.

Adam drawing a mushroom
Adam drawing a mushroom.

Adam had taken his sketchbook with him and he and his sister drew mushrooms. Adam was looking forward to find actual mushrooms to sketch.

A large snail resting on a tree. Photo taken by Adam
A large snail resting on a tree. Photo taken by Adam.

Once in the forest we spotted large snails resting on trees. Alice and Adam like snails a lot. Alice even keeps a pet snail.

Adam and Alice exploring
Adam and Alice exploring.

While the children kept looking for mushrooms I kept looking for butterflies, hoping to take a few nice photos of those insects.

A large snail on Adam's hand
A large snail on Adam's hand.

After some walking we reached the visitor's center which has a nice garden. We walked the tracks keeping our eyes peeled for butterflies, mushrooms etc. I did spot a large dragonfly but it was too skittish.

Ferns in the garden of the visitor's center
Ferns in the garden of the visitor's center.

After some more relaxing in the garden we walked back to our bikes. We had a reservation for 4pm at the restaurant "De Bosrand" and got there just a bit late. It was a great day with fantastic weather.

A track in the forest
A track in the forest.

See also a blog post on an earlier visit to this forest.

How to Twitter

Believe it or not, Twitter can be a very useful source of information and news. Or, it can waste your time and make you sad. It’s all in how you use it. Here I’ll show you how to make Twitter work for you, instead of against you.

Source: How to Twitter, an article by Lee Phillips.

Intro to The AES-256 Cipher

AES, or “Advanced Encryption Standard”, is an encryption specification that uses the Rijndael cipher as its symmetric key ciphering algorithm. AES encrypts a message with a private key, and no one but the key holder can decrypt the message. A great example of a good use-case for AES-256 is encrypting all the data on the hard drive of a computer when it’s not in use.

Source: Intro to The AES-256 Cipher, an article by Lane Wagner.