Bookmark
25 Best SSH Commands / Tricks
blog.urfix.com/25-ssh-commands-tricks/, posted 2010 by peter in howto list networking reference security shell
SSH is an awesome powerful tool, there are unlimited possibility when it comes to SSH, heres the top Voted SSH commands.
Bookmark
Berners-Lee: Facebook 'threatens' web future • The Register
www.theregister.co.uk/2010/11/20/berners_lee_says_facebook_a_thret_to_web/, posted 2010 by peter in media mobile networking opinion social
"The sites assemble these bits of data into brilliant databases and reuse the information to provide value-added service—but only within their sites. Once you enter your data into one of these services, you cannot easily use them on another site. Each site is a silo, walled off from the others. Yes, your site’s pages are on the Web, but your data are not. You can access a Web page about a list of people you have created in one site, but you cannot send that list, or items from it, to another site."
...
He also bemoans the proliferation of net-connected apps on the Apple iPhone and other smartphones. "The tendency for magazines, for example, to produce smartphone 'apps' rather than Web apps is disturbing, because that material is off the Web. You can’t bookmark it or e-mail a link to a page within it. You can’t tweet it. It is better to build a Web app that will also run on smartphone browsers, and the techniques for doing so are getting better all the time."
Bookmark
FBI pressuring Google, Facebook to allow ‘back doors’ for wiretapping | Raw Story
www.rawstory.com/rs/2010/11/fbi-pressuring-google-facebook-wiretapping/, posted 2010 by peter in communication fascism networking politics privacy security usa
FBI Director Robert Mueller traveled to Silicon Valley this week to convince major Internet players to build "back doors" into their software that will allow law enforcement to wiretap data on their networks, says a news report.
It's part of an effort to expand the FBI's wiretapping powers to include the latest communications technologies, including social networking sites, voice-over-Internet (VoIP) telephone services and BlackBerries.
But privacy and civil rights advocates are raising the alarm about the proposal, saying that the proposed wiretapping tools could just as easily be used by hackers to steal personal information, or by oppressive governments to track political dissidents.
Bookmark
Guacamole
guacamole.sourceforge.net/, posted 2010 by peter in communication free html java javascript networking software
Guacamole is an HTML5 + JavaScript (AJAX) viewer for VNC, which makes use of a server-side proxy written in Java. The current version is almost as responsive as native VNC and should work in any browser supporting the HTML5 canvas tag.
Guacamole provides access to your VNC server through a proxy written in Java. The server-side half of Guacamole thus requres a servlet container like Apache Tomcat, while the client-side requires nothing more than a web browser supporting HTML5 and AJAX.
Bookmark
Anyterm - Introduction
anyterm.org/, posted 2010 by peter in communication free javascript networking security shell software
Anyterm consists of some Javascript on a web page, an XmlHttpRequest channel on standard ports back to the server, an HTTP proxy such as Apache's mod_proxy and the Anyterm daemon. The daemon uses a pseudo-terminal to communicate with a shell or other application, and includes terminal emulation.
Key presses are picked up by the Javscript which sends them to the daemon; changes to the emulated screen are sent from the daemon to the Javascript which updates its display.
Performance is quite reasonable and SSL can be used to secure the connection.
Bookmark
Only 1.7% of sites blocked by Scandinavia's "child-porn" filters are actually child porn
www.boingboing.net/2010/09/30/only-17-of-sites-blo.html, posted 2010 by peter in fascism networking politics privacy propaganda security sweden
Germany's working group against censorship, AK Zensur, has analysed a few recent Scandinavian blacklists, allegedly meant to block sites containing child abuse material. Our less-than-surprising findings:
* From 167 listed sites, only 3 contained such material. * Two of them were listed on different blacklists since 2008, obviously without the authorities trying to take the sites offline. * All three were taken down by the hosting providers within hours or even minutes after receiving an AK takedown request by email.
So what were the reasons again that made access blocking an essential weapon in fighting child abuse?
Bookmark
Welcome - netboot.me
www.netboot.me/, posted 2010 by peter in linux networking online software virtualization
netboot.me is a service that allows you to boot nearly any operating system
or utility on any computer with a wired internet connection - without having to
know ahead of time what you'll want to boot. Once you can netboot.me, you never
need to update your boot disk again!
netboot.me works through the magic of netbooting. There are a number of
ways to boot a computer with netboot.me. The simplest is to
download a bootable image and burn it to a CD, USB
memory stick, or floppy disk. Boot off it on any networked computer, and it
will automatically fetch the latest boot options from netboot.me and let you
choose from dozens of installation, recovery, testing, portable desktop and
other tools. You can also start netboot.me from any computer running gPXE,
or from any netbootable computer with some simple tweaks to your DHCP server.
Bookmark
OStatus | people on different networks following each other
ostatus.org/, posted 2010 by peter in messaging networking social specification standard
OStatus is an open standard for distributed status updates. Our goal is a specification that allows different messaging hubs to route status updates between users in near-real-time.
Bookmark
The case of the 500-mile email
www.ibiblio.org/harris/500milemail.html, posted 2010 by peter in email history humor networking physics statistics
"We can't send mail farther than 500 miles from here," he repeated.
"A little bit more, actually.
Call it 520 miles.
But no farther."
Bookmark
Munin - Trac
munin-monitoring.org/, posted 2010 by peter in free linux monitoring networking software statistics
Munin is a networked resource monitoring tool that can help analyze resource trends and "what just happened to kill our performance?" problems. It is designed to be very plug and play. A default installation provides a lot of graphs with almost no work.
|< First < Previous 41–50 (89) Next > Last >|