Search Content

Displaying 1 - 20 of 84

… Who's behind that web site? SSL, Certificates, and detecting phishers Submitted by John … it's not. In this edition: Who is behind that web site? SSL, Certificates, and detecting phishers Anatomy of a web …

… RapidSSL Certificate Our SSL Certificates are issued by Verisign and Geotrust. The … store. Price $49.00 Quantity SKU MH-SSL1-Rapid-t … Our SSL Certificates are issued by Verisign and Geotrust. The …

… (April 8). We are working with our site owners who use SSL to replace their certificates and revoke the old ones, in … these customers about whether they need to replace their SSL certificate. If you run a dedicated or virtual server, …

… files for security reasons. Switching between trunk and a tag So far so good. We have the basics of an application set … Simple. Just check it out: cd public_html/dojo git tag # shows you a list of available tags git checkout … with your changes. Also note that when you check out a tag, you don't necessarily get a tracking branch, so don't …

… one other, critically important feature of how most public key encryption works -- it can be used as a digital … device key combined with your passphrase. On Amazon, keys are stored/managed through a key server. On many disk … works Self Disk, files This is mainly a matter of securing keys -- if you're not sharing encrypted data with others, you …

… discovered sooner rather than later -- or have all private keys also encrypt to a law-enforcement's key, so that law-enforcement can decrypt it. But what if your … easily attacked via social engineering, and these secret keys revealed? Having a skeleton key like this becomes a much …

… FreeS/WAN , open source IPSec implementation Smoothwall Firewall Web Sites Distributed Computing Sites Add new … FreeS/WAN , open source IPSec implementation Smoothwall Firewall Web Sites Distributed Computing Sites … Remote …

… could get compromised with this type of attack. Visit any SSL sites? A secure SSL certificate on a server might have … addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> …

… on master is if we have to roll back to a previous release tag, if something truly went wrong. Staging is where things … Next it's a matter of doing the production deployment: Tag current production code commit Back up current production …

… Email Solutions In today's connected world, having access to your … to a closet into a fully functional email server. … Email Solutions …

… to a new point release of Drupal means merging the new tag into our branch. Then we've written a script to update … and the development copy on develop. And it created a git tag for the particular release. On production, we have … back to development and re-roll the release. git log/git tag -- identify the current state of the code base -- should …

… cache, runs all the database updates, and reverts all the features (applying configuration stored in code). Once … cache, runs all the database updates, and reverts all the features (applying configuration stored in code). Once …

… Client accidentally deleted their server. We recovered in … must have JavaScript enabled to use this form. Your name Email The content of this field is kept private and will not …

… Apache, MySQL, PHP, configuring up to 6 virtual hosts/SSL configuration, IP addressing, backup configuration, … Apache, MySQL, PHP, configuring up to 6 virtual hosts/SSL configuration, IP addressing, backup configuration, …

… up imap.freelock.com and smtp.freelock.com as additional names for our mail server -- many mail programs set these by … the nested folder and not a long name with dots in it. Domain Verification/DKIM signing A big improvement for our …

… If you own a pet, by the way, head over and get a pet tag while they're still free! The pet tag has a QR code that will take people who scan it with a … If you own a pet, by the way, head over and get a pet tag while they're still free! The pet tag has a QR code that …

… able to identify several big wins, such as: setup meta tag module, disabling php filters, fixing staff directory … able to identify several big wins, such as: setup meta tag module, disabling php filters, fixing staff directory …

… get far in harvesting our legitimate addresses. Sender Policy Framework (SPF): This tactic works best for those … you. There are two parts to setting up SPF: publishing a policy for where mail from your domain can come from, and …

… it takes a registry hack: https://support.microsoft.com/kb/841215 http://www.simple-groupware.de/cms/WebDAV First of … fix you can download that makes it work SOMETIMES. http://kb.iu.edu/data/araf.html Windows XP only supported … file for? Nice instructions, with screenshots: https://kb.wisc.edu/luwmad/page.php?id=6280 …

… control over their domain name so we can purchase an SSL cert and launch. The second one is waiting for the … control over their domain name so we can purchase an SSL cert and launch. The second one is waiting for the …