https://pinboard.in/
First saw this in a webinar led by Jason Clark and thought it was cool.
Thinking about it again and feel like I should do it. But I'm worried it's
just my tendency to want it because its something neato.
Anybody using it and recommend it? (or signed up and regret it?) I
On 11/20/14 9:11 AM, Brad Coffield wrote:
https://pinboard.in/
First saw this in a webinar led by Jason Clark and thought it was cool.
Thinking about it again and feel like I should do it. But I'm worried it's
just my tendency to want it because its something neato.
Anybody using it and
I've been using it for years as a personal bookmarking tool, and
thinks it's excellent. Jason may be doing more complex things with it,
though.
- Daniel.
On Thu, Nov 20, 2014 at 9:11 AM, Brad Coffield
bcoffield.libr...@gmail.com wrote:
https://pinboard.in/
First saw this in a webinar led by
I've been using it since fairly early days. I like it but don't get
exceptionally fancy beyond my own esoteric taxonomy for defining my
bookmarks.
On Thu, Nov 20, 2014 at 9:19 AM, Daniel Lovins daniel.lov...@nyu.edu
wrote:
I've been using it for years as a personal bookmarking tool, and
I like the platform, but I think I really paid for Maciej's wit.
http://idlewords.com/bt14.htm
On Thu, Nov 20, 2014 at 10:27 PM, Rogan Hamby rogan.ha...@yclibrary.net
wrote:
I've been using it since fairly early days. I like it but don't get
exceptionally fancy beyond my own esoteric
I'm a big fan of pinboard, personally and professionally. At Ithaca College
Library, we have a shared account where librarians can tag stuff. Then we
have a PHP script that generates public pages based on their tags. See, for
instance: birds
I'm convinced! Thanks everybody :)
On Thu, Nov 20, 2014 at 9:45 AM, Ron Gilmour rgilmou...@gmail.com wrote:
I'm a big fan of pinboard, personally and professionally. At Ithaca College
Library, we have a shared account where librarians can tag stuff. Then we
have a PHP script that generates
I see you are convinced, but did want to add in my vote for Pinboard as
well. I, too, am a die-hard Evernote user, and I still find Pinboard very
useful. Pinboard is my read-it-later tool of choice, which works extremely
well for me -- if I decide to keep the article I've read, well, it's
already
Digital Archivist
Fidelity Investments
Boston
The Digital Archivist will be a member of a team and will be responsible for
the planning and implementation of a digital asset management system for the
archival collections of electronic and digital media. You will also manage the
cataloging of
Thanks Jodie, I'm happy to hear someone using evernote and pinboard in
conjunction. Excited to get started with pinboard!
On Thu, Nov 20, 2014 at 10:47 AM, Jodie Gambill jodie.gamb...@gmail.com
wrote:
I see you are convinced, but did want to add in my vote for Pinboard as
well. I, too, am a
This is a friendly reminder that you have 5 more days to vote on this year’s
prepared talk proposals. Voting will end on Tuesday, November 25, 2014 at
11:59:59pm PT (GMT-8).
Thanks,
Chris
On Nov 11, 2014, at 7:33 AM, Chris Beer ch...@cbeer.info wrote:
The Code4Lib 2015 Program Committee
*About The Lesbian Herstory Archives*
In operation since 1974 and currently celebrating our 40th Anniversary, The
Lesbian Herstory Archives http://www.lesbianherstoryarchives.org/ has
been home to the world's oldest and largest collection of
archival, bibliographic and multimedia materials by and
Ditto -- $25/year for hosted personal web-bookmark archiving is priceless.
On Thu, Nov 20, 2014 at 9:41 AM, Peter Murray peter.mur...@lyrasis.org
wrote:
I'm a happy pinboard user: https://pinboard.in/u:dltj
I pony up the $25/year for the full-text search, and I've found that to be
more
Personally, I'd be tempted to go the IP lockout route myself since the
patterns should be clear in the logs, but be aware that # megabytes gives a
reasonable level of control because you can set to log rather than lock
out. I think the risk of locking legitimate users is low. Although people
can
On 11/20/14 1:06 PM, Kyle Banerjee wrote:
BTW, you can do some funky things with EZP that include
conditional logic
Can you say more about funky things you can do with EZProxy involving
conditional logic? Cause I've often wanted that but haven't found any!
Are you talking about a particular
I can't remember the details because I haven't worked with EZP for years
and unfortunately, this stuff isn't documented.
Where I used it was in the user.txt file when authenticating. Things you
can do include setting/modifying session, regular EZP, and arbitrary
variables, as well as doing
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Here's some of the relevant documentation of the user.txt expressions Kyle
mentioned. It is possible to set session variables and get them to be
logged - we're doing this with certain Shibboleth attributes for business
analysis. I have not had luck
On Nov 19, 2014, at 11:47 PM, Dan Scott wrote:
On Wed, Nov 19, 2014 at 4:06 PM, Kyle Banerjee kyle.baner...@gmail.com
wrote:
There are a number of technical approaches that could be used to identify
which accounts have been compromised.
But it's easier to just make the problem go away by
Logging user ID's has a benefit if it's used properly (access tightly
controlled to a select group)
If campus ID's are being used by bots to harvest content, it means that you
have users whose credentials are compromised. Whoever obtained this
information also has access to e-mails, student
Brute force attacks aren't the problem. There's a simple param in EZproxy
that blocks an IP and/or user account after a certain number of failed
logins. I suspect that the problem is that attackers already have valid
login credentials from one of the thousands of security breaches in the
last few
Blocking the IP is the obvious solution but not ideal at all. First off,
it's trivially easy to bypass IP blacklists using proxies. I don't want to
play a game of never-ending IP whack-a-mole. Second, it notifies the
attacker that we are onto them, which makes it less likely for us to catch
them.
That looks promising, but I can't make heads or tails of how to implement
any of those rules. Is there a way I can set up the logger to only record
usernames if the IP address matches a list of malicious IPs?
Josh Welker
-Original Message-
From: Code for Libraries
Assuming that the credentials are in fact compromised. They could also be
given away or sold, including by the person they belong to. And while it is
trivially easy to employ proxies, only a handful of people bother.
Finding free EZP credentials is crazy easy on Google. Try it -- you'll have
more
23 matches
Mail list logo