Hi all,
What do people use these days to filter out websites?
I would prefer to have a white-list and block everything else. With the option
to bypass this filter for certain authenticated users.
Reason: I don't want my daughter to see unsuitable websites when she starts
looking for cat pictur
On Sat, Jan 23, 2016 at 09:52:29PM +0100, k...@aspodata.se wrote:
> Karl Hammar:
> > Alec Ten Harmsel:
> > > On Tue, Jan 19, 2016 at 10:05:49PM +0100, k...@aspodata.se wrote:
> > > > Alec: Ten Harmsel:
> > > > > On Tue, Jan 19, 2016 at 08:01:19PM +0100, k...@aspodata.se wrote:
> > > > > > Makefile
On Sat, Jan 23, 2016 at 7:44 PM, Andrew Savchenko wrote:
>
> a) EXT4 is a good extremely robust solution. Reliability is out of
> the questioning: on my old box with bad memory banks it kept my data
> safe for years, almost all losses were recoverable. And it has some
> SSD-oriented features like
Hi,
I plan to use NVMe SSD on my desktop and I'm quite puzzled with
the filesystem choice :/ So community input on this matter will be
very valuable.
Typical anticipated workload: root filesystem, a lot of small and
middle sized files (e.g. source code), tons of compiling, ccache,
testing and sim
Karl Hammar:
> Alec Ten Harmsel:
> > On Tue, Jan 19, 2016 at 10:05:49PM +0100, k...@aspodata.se wrote:
> > > Alec: Ten Harmsel:
> > > > On Tue, Jan 19, 2016 at 08:01:19PM +0100, k...@aspodata.se wrote:
> > > > > Makefile:1318: recipe for target 'xinput.c' failed
> > > > > when emerging x11-libs/li
On Sat, Jan 23, 2016 at 12:17 PM, Mick wrote:
> I would have thought SSL certificates/keys would be protected in RAM, but if
> you have a Man-In-The-Browser attack I guess they wouldn't be.
>
As far as I'm aware linux doesn't do anything to protect process RAM
from other processes with the same U
On Saturday 23 Jan 2016 09:55:35 Rich Freeman wrote:
> On Sat, Jan 23, 2016 at 8:25 AM, Mick wrote:
> > On Tuesday 19 Jan 2016 15:59:25 Grant wrote:
> >> > If a user certificate is lost of feared compromised, you revoke it with
> >> > your CA and upload the CRL to the server.
> >> >
> >> > Howeve
On Thursday, January 21, 2016 11:17:05 PM lee wrote:
> "J. Roeleveld" writes:
> > On Tuesday, January 19, 2016 11:22:02 PM lee wrote:
> >> "J. Roeleveld" writes:
> >> > [...]
> >> > If disk-space is considered too expensive, you could even have every VM
> >> > use
> >> > the same base image. And
On Sat, Jan 23, 2016 at 8:25 AM, Mick wrote:
> On Tuesday 19 Jan 2016 15:59:25 Grant wrote:
>
>> > If a user certificate is lost of feared compromised, you revoke it with
>> > your CA and upload the CRL to the server.
>> >
>> > However, this won't do away with XSS, or other similar attack vectors
On Tuesday 19 Jan 2016 15:59:25 Grant wrote:
> >> > I'm sorry, I meant can I lock down access to my web stuff so that a
> >> > particular user can only come from a particular device (or from any
> >> > device containing a key).
> >
> > You can use apache client authentication with SSL certificates
10 matches
Mail list logo