MakeUseOf

Thursday, March 22, 2012

WebSiteWealth.biz | Opportunities Of A Lifetime Must Be Seized Within The Lifetime Of The Opportunity!

WebSiteWealth.biz | Opportunities Of A Lifetime Must Be Seized Within The Lifetime Of The Opportunity!: "The answers may not always simply be, to dig in and work harder. Often what is required is for us to collectively gather to work smarter. It is true that adversity is the test that causes us to do our best thinking. However thinking alone will not allow any of else to prevail at the end of the day. We as a small group of individuals who have decided to collaborate here on this very site, realize that we are only several steps away from realizing our full potential."

'via Blog this'

Wednesday, March 7, 2012

Synology Inc. Network Attached Storage - NEW NAS Experience -View topic - Simple How To Guide: Setting Up Daily Email Notifications

Synology Inc. Network Attached Storage - NEW NAS Experience -View topic - Simple How To Guide: Setting Up Daily Email Notifications: "e: Simple How To Guide: Setting Up Daily Email Notification
by mszymcza » Fri Jun 03, 2011 3:18 pm
BTW, if you notice that your /etc/crontab is empty after reboot, you likely have used [space] instead of [Tab] between your columns. Go back in and vi your /etc/crontab file. Remove spaces and replace them with tabs. There is some sort of file validation during reboot that will nuke entries that don't conform exactly to what it expect for delineation."

'via Blog this'

Tuesday, March 6, 2012

The /etc/ftpaccess file - Administration

The /etc/ftpaccess file - Administration: "Setup the /etc/ftpaccess file
The ftpaccess file controls who gets into the FTP server and how. There are a couple of associated files (like ftpusers) that you can read man pages on to get more detail, but that documentation is actually quite clear, so I won't reiterate it here.

In ftpaccess, you're creating a plan for who can do what. With non-anonymous chroot access, you want to create a set of guestgroups, each of which corresponds directly to entries in the /etc/group file. You s"

'via Blog this'

Allowing FTP access to files outside the home directory chroot | MDLog:/sysadmin

Allowing FTP access to files outside the home directory chroot | MDLog:/sysadmin: "we want to restrict the access that ftp users will have (limited access to files normally in their own home directory) but also we want to allow them access to another folder that is normally in a different location (like development files for whatever work they are doing).
The problem is that if we configure the chroot restriction for the ftp users we will notice that as expected they will be locked in the chrooted folder (let’s say their home directory). If we try to create a symlink to the other folder they need access, this will just not allow them to change into that folder (break out the chroot) and this is very normal."

'via Blog this'

The /etc/ftpaccess file - Administration

The /etc/ftpaccess file - Administration: "In ftpaccess, you're creating a plan for who can do what. With non-anonymous chroot access, you want to create a set of guestgroups, each of which corresponds directly to entries in the /etc/group file. You should repeat these entries in the chroot'd group file, too, with the same IDs.
Here are the lines you need to make sure are in the ftpaccess file to make this all work. Let's assume three groups: frogstar, bilbo, and foobar. I'm only including the parts that are specifically necessary to make non-anonymous access work; you can leave the rest of the model file the same, or read the man page to figure out how to further customize."

'via Blog this'

Welcome to xen.org, home of the Xen® hypervisor, the powerful open source industry standard for virtualization.

Welcome to xen.org, home of the Xen® hypervisor, the powerful open source industry standard for virtualization.: "

The Xen® hypervisor, the powerful open source industry standard for virtualization, offers a powerful, efficient, and secure feature set for virtualization of x86, x86_64, IA64, ARM, and other CPU architectures. It supports a wide range of guest operating systems including Windows®, Linux®, Solaris®, and various versions of the BSD operating systems. What is Xen? - Why Xen?

Xen powers most public cloud services and many hosting services, such as Amazon Web Services, Rackspace Hosting and Linode."

'via Blog this'

Virpus | Unmanaged VPS, Cheap VPS, VPS Hosting, Cloud Hosting, Cheapest VPS, Virtual Private Server Hosting, VPS Hosts, VPS Server, Xen VPS Hosting, Windows VPS Hosting, VPS Windows

Virpus | Unmanaged VPS, Cheap VPS, VPS Hosting, Cloud Hosting, Cheapest VPS, Virtual Private Server Hosting, VPS Hosts, VPS Server, Xen VPS Hosting, Windows VPS Hosting, VPS Windows: "XEN VPS HOSTING - PLANS AND PRICINGWelcome to the world of virtual private servers, featuring full root access, private exclusive resources on powerful servers! Virpus makes VPS Hosting easier by incorporating SolusVM with all VPS's to easily reload, reboot, and take backups of your VPS. Xen VPS Hosting doesn't get any better than this!"

'via Blog this'

CloudLinux – What you need to know | AriesHosting.org Web Hosting

CloudLinux – What you need to know | AriesHosting.org Web Hosting: "CloudLinux is the first commercial OS that meets the specific needs and demands of web hosting. Imagine if servers going down due to one customer suddenly hogging all the resources was no longer possible. CloudLinux makes rock hard hosting stability a reality. We used to accept that servers will go down during heavy resource spikes and you deal with it by being responsive. CloudLinux does it better by isolating and controlling resource spikes to prevent entire servers going down."

'via Blog this'

Supreme Servers | Xen VPS Hosting Provider | Virtual Private Servers | Call Now: 305.767.1011

Supreme Servers | Xen VPS Hosting Provider | Virtual Private Servers | Call Now: 305.767.1011: "Supremeserves.com is proud to offer Linux VPS Hosting (Linux Virtual Private Server Hosting) on our high availability hosting cloud infrastructure. You also have access to our 24/7/365 support team and SSH access to your server for complete control. Launch your hosting today with our Linux Reseller VPS Hosting plan.

Start your web hosting business with the most high performance and flexible cPanel VPS solution available."

'via Blog this'

SkyServer: Server | BluePoint Data

SkyServer: Server | BluePoint Data: "All of our SkyServer servers are built on enterprise class SAN.
All of our storage is backed up using best-of-breed data protection software and hardware.
All of our virtual servers are fully redundant, in that automated failover is provided for every operating system image.
We use only industry standard virtualization such that you are not subjected to any experiments or toed to a proprietary or closed system."

'via Blog this'

SkyServer: Server | BluePoint Data

SkyServer: Server | BluePoint Data: "osted virtual servers are not created equal. First there’s the hardware itself: many virtual server farms are literally built on a house of cards, using techniques developed years ago when Windows servers were used for non-mission critical functions. Servers, networks, and storage, built to these antiquated and obsolete specifications have no place in cloud computing.

Today, the demands of cloud computing require, dare we say, a mainframe-like approach to systems management. To put this in more general terms, a chain is only as strong as its weakest link and therefore cloud computing infrastructure must be built, and more importantly maintained in a way that it is absolutely reliable."

'via Blog this'

Cartika Cloud.Cloud Hosting and Cloud Servers by Cartika Cloud

Cartika Cloud.Cloud Hosting and Cloud Servers by Cartika Cloud: "Cartika delivers an Enterprise grade Cloud Solution that can be delivered as a fluid, elastic and complete Infrastructure as a Service (IaaS) offering. The Cartika Cloud offers real fluidity of instances, utility billing, elasticity and real high availability. See the Cartika Cloud Network Diagram. Compare our Cloud Servers vs Utility VPS Servers or solutions our competitors are marketing and selling as "cloud" based solutions.
Cartika's ZFS Cloud Storage Backbone is simply the most advanced and highly available storage platform available with any public or private cloud offering."

'via Blog this'

Sunday, March 4, 2012

A Complete Guide to VPS Hosting

A Complete Guide to VPS Hosting: "So What IS VPS, Anyway?
In answering this question, maybe it’s better to examine how VPS hosting fits in to the overall offerings of most hosting companies. Shared hosting is just that – your site is hosted on a machine with a bunch of other sites, and each of you share the same resources, including RAM, disk space, and CPU. Your site uses what it needs if it’s available, and if it’s not – well, that’s the limitation of shared hosting. Likewise, a dedicated server is also self-explanatory – your site is the only one hosted on server, and you have all the aforementioned resources available at your beck and call"

'via Blog this'

post - Are https URLs encrypted? - Stack Overflow

post - Are https URLs encrypted? - Stack Overflow: "But if you are using GET instead of POST then the user will still be able to cut and paste the URL out of the location bar, and you will probably not want to put confidential information in there that can be seen by anyone looking at the screen.

All that said, you should be careful of your terminology. To quote a famous swashbuckler: You keep using that word (URL) I do not think it means what you think it means"

'via Blog this'

post - Are https URLs encrypted? - Stack Overflow

post - Are https URLs encrypted? - Stack Overflow: "
3
down vote
An addition to the helpful answer from Marc Novakowski - the URL is stored in the logs on the server (e.g., in /etc/httpd/logs/ssl_access_log), so if you don't want the server to maintain the information over the longer term, don't put it in the URL.

link|improve this answer
answered Nov 2 '10 at 14:03

Rhodri Cusack
311
This is a very good point – so even if they are encrypted, maybe better not to put secret information in them anyway. – William Denniss "

'via Blog this'

post - Are https URLs encrypted? - Stack Overflow

post - Are https URLs encrypted? - Stack Overflow: "
4
down vote
I'm going to take a leap here and assume you mean the "GET" portion of the https request.

In that case, yes and no. The server address portion of the URL is obviously not encrypted since it is used to set up the connection.

Everything else is encrypted in an HTTPS connection. But if you are using GET instead of POST then the user will still be able to cut and paste the URL out of the location bar, and you will probably not want to put confidential information in there that can be seen by anyone looking at the screen."

'via Blog this'

post - Are https URLs encrypted? - Stack Overflow

post - Are https URLs encrypted? - Stack Overflow: "
And URL recording is important since there are Javascript hacks that allow a completely unrelated site to test whether a given URL is in your history or not. You can make a URL unguessable by including a longish random string in it, but if it's a public URL then the attacker can tell that it has been visited, and if it has a short secret in it, then an attacker could brute-force that at reasonable speed"

'via Blog this'

post - Are https URLs encrypted? - Stack Overflow

post - Are https URLs encrypted? - Stack Overflow: "
49
down vote
accepted
Yes, the SSL connection is between the TCP layer and the HTTP layer. The client and server first establish a secure encrypted TCP connection (via the SSL/TLS protocol) and then the client will send the HTTP request (either GET or POST) over that encrypted TCP connection."

'via Blog this'

post - Are https URLs encrypted? - Stack Overflow

post - Are https URLs encrypted? - Stack Overflow: "It's probably a bad idea to put confidential data in the URL anyway. It will be displayed in the browser's address bad too, remember? People don't like it if their password is visible to anyone who happens to glance at the screen. Why do you think you need to put confidential data in the URL? – jalf Jan 31 '09 at 22:03
5
URLs are also stored in browser history and server logs - if I wanted to have my name and password stored somewhere, it would not be in these two places. – Piskvor Jun 30 '10 at 15:33
1
For example, suppose I visit https://somewhere_i_trust/ways_to_protest_against_the_government/"

'via Blog this'

Join Exa's global team.

Join Exa's global team.: "Exa delivers patented, high-quality software solutions to enable and enhance our customer’s success in the global marketplace.

We are committed to delivering a cutting-edge suite of products that are unparalleled for engineering design optimization. We encourage our employees to have a passion for learning, innovative thinking, ownership and personal achievement and we value people who work for the success of the customer, the success of the company, and the success of the team."

'via Blog this'

EXA Solutions

EXA Solutions: "Press releases & news

10.10.2011
EXA Consulting Limited is now official member of EXA.
27.05.2011
Yes we expand! Our new Limassol office opens its doors. In the beginning, main activities of the office will be design and development."

'via Blog this'

Exa-tech

Exa-tech: " Welcome to Exa-tech (Software & Consulting)

Building stable, high performance, visual applications...

Exalligence LTD
Software Engineer

Education:

Bachelor and/or Master Degree in Computer Engineering / Computer Science, Electrical-Electronics

Engineering and other related engineering fields. MSc or Phd students can also apply."

'via Blog this'

cloudvpn - Wiki - dev.e-x-a.org

cloudvpn - Wiki - dev.e-x-a.org: "Installing CloudVPN
Files section comes handy. If you want some special version (as in "bleeding edge"), please clone it off the git:

git clone http://repos.e-x-a.org/cloudvpn.git

If you want actual software, remember that last working version is 1.99.8, so checkout the tag.

Compiling
If you clone the git, run ./autogen.sh which makes basic autotools for you. Then you can continue with ./configure, make, etc."

'via Blog this'

X.Org Wiki - Home

X.Org Wiki - Home: "The X.Org project provides an open source implementation of the X Window System. The development work is being done in conjunction with the freedesktop.org community. The X.Org Foundation is the educational non-profit corporation whose Board serves this effort, and whose Members lead this work.

The current X.Org release is X11R7.6. The next major release will be X11R7.7. Information about all releases is available. (Important: If you have an older release, please see the SecurityPage for information on security updates.)"

'via Blog this'

freedesktop.org - Home

freedesktop.org - Home: "freedesktop.org is open source / open discussion software projects working on interoperability and shared technology for X Window System desktops. The most famous X desktops are GNOME and KDE, but developers working on any Linux/UNIX GUI technology are welcome to participate.

freedesktop.org is building a base platform for desktop software on Linux and UNIX. The elements of this platform have become the backend for higher-level application-visible APIs such as Qt, GTK+, XUL, VCL, WINE, GNOME, and KDE. The base platform is both software and specifications."

'via Blog this'

Introducing A New Concept.

These are some of the answers I have found on the internet. Any Questions?