Search Content

Displaying 1 - 20 of 85

… Encryption Chapter References Submitted by John Locke on Mon, … ," by Eddie Turkaly Software OpenSSL , open source encryption libraries GPG , open source encryption for files …

… by complaining (loudly) when you visit an unencrypted page that has a credit card field or a password. While most … to my comment Comment About text formats Filtered HTML Web page addresses and email addresses turn into links … by complaining (loudly) when you visit an unencrypted page that has a credit card field or a password. While most …

… a whole new generation of crypto-currencies that use encryption in ingenious ways to securely transfer money from … your checking account and refund the customer. But what is encryption, really? And how does this affect regular people? The best metaphor for encryption is simply an envelope. It's a container you put …

… Worst case scenario: Protecting files when you lose your computer Submitted by John Locke on … it unencrypted on a laptop hard drive, especially not in public places. For all you employees carrying laptops owned … the #1 result in Google, for a search on "Linux consulting Seattle." Our services are growing more stable, and we're …

… Encrypt filesystems with EncFS and Loop-AES Submitted by John Locke on Mon, 03/20/2006 - 14:02 We've written about encryption in our newsletters on Freelock.com , but it looks … there are some new options available. EncFS is a Linux encryption system that encrypts individual files on the fly, …

… files for security reasons. Switching between trunk and a tag So far so good. We have the basics of an application set … Simple. Just check it out: cd public_html/dojo git tag # shows you a list of available tags git checkout … with your changes. Also note that when you check out a tag, you don't necessarily get a tracking branch, so don't …

… for detecting spyware in Windows GPG , open source encryption for files and email kgpg , open source graphical … GPG interface for Windows Ccrypt , open source symmetrical encryption Web Sites Diceware , a system for generating … for detecting spyware in Windows GPG , open source encryption for files and email kgpg , open source graphical …

… which includes authentication, monitoring, auditing, and encryption. Security measures have been built into the … In addition, measures including but not limited to encryption are used to ensure the integrity and security of … which includes authentication, monitoring, auditing, and encryption. Security measures have been built into the …

… an hour ahead? You're six blocks from me! Reply Add new comment You must have JavaScript enabled to use this form. … me when new comments are posted All comments Replies to my comment Comment About text formats Filtered HTML Web page …

… decisions you make about IT create the foundation for your business. In order to stay competitive, your network and … remaining reliable, secure and able to change with your business. At Freelock, we understand the need for secure … decisions you make about IT create the foundation for your business. In order to stay competitive, your network and …

… a particular technology. For the past year, my favorite is Matrix, a distributed chat system that addresses pretty much … Riot is the new name for the most polished, easiest to use Matrix app. The first big reason to use Matrix is that you …

… could do the same... / Freelock News We've cleaned up our newsletter template a little, and got a news feed to work. … the left. Also notice our new licensing terms below--this newsletter now uses a Creative Commons license, permitting … any copies you distribute. Feel free to forward the entire newsletter or any chunk of it, to anyone you want! We're hard …

… and Disaster Recovery Why you should have an effective backup strategy What can go wrong? How do I back up my data? … What can go wrong? Obviously, if I didn't have a good backup of my data, such an event could be catastrophic to my … I highly recommend having a server, and concentrating your backup efforts on the server instead of individual …

… on master is if we have to roll back to a previous release tag, if something truly went wrong. Staging is where things … Next it's a matter of doing the production deployment: Tag current production code commit Back up current production …

… to a new point release of Drupal means merging the new tag into our branch. Then we've written a script to update … and the development copy on develop. And it created a git tag for the particular release. On production, we have … back to development and re-roll the release. git log/git tag -- identify the current state of the code base -- should …

… Security Story Type Features Industry Business E-Commerce Retail Software Add new comment You must have JavaScript …

… out the: "Your Information" Form Planning your Site (Features & Design) The sky is the limit when it comes to … the best value, a nice balance between cost, usability, features, and implementation speed. See our Publishing …

… Once the dev site is updated, we create a new release tag and push it into our central git repository, where … regular backups of the files. We do a final snapshot/tag of the production code base, then pull down the new … Once the dev site is updated, we create a new release tag and push it into our central git repository, where …

… addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> …

… Why Open Source? The software industry is built upon making … Software is poorly supported, poorly documented, doesn't work well together, and isn't widely accepted. It does have …