100SILEX, de 0 ŕ 100 s: apply
1522 5 Simple steps to secure TT-RSS reader
secure tt-rss, tt-rss security
5 Simple steps to secure TT-RSS reader
July 27, 2015 by Anand Leave a Comment
Share: share htpcBeginner
We recently presented Tiny Tiny RSS to you as a great alternative to Google reader, which is one more way you can extend the functionality of your home server or your hosting space. Hopefully, you already exported your data from Google Reader. In this post, we will show you how to secure TT-RSS reader to prevent unauthorized access. Tiny Tiny RSS is an open source web-based news feed (RSS/Atom) reader and aggregator, designed to allow you to read news from any location, while feeling as close to a real desktop application as possible. As we previously explained, it makes an ideal candidate to replace Google Reader. While there are services like Feedly and Newsblur grabbing the crowd Google Reader, which some of you may prefer, there are a group of people who would like to run a RSS reader on their own server and keep things private. Assuming that you have already installed Tiny Tiny RSS on your alternative to Google reader or hosting space, we will now show you how to secure TT-RSS reader.
Secure TT-RSS Reader
One of the main reasons to move to an RSS aggregator like TT-RSS is maintaining your privacy. So if you do not secure TT-RSS reader well you are not only making your data available public but also making your system vulnerable to potential attacks. Choosing a strong username and password while setting your TT-RSS is the first basic thing that you can do to secure TT-RSS reader. Listed below are few more ways you can increase TT-RSS readerâs security.
1. Rename TT-RSS Folder
One of the first lines of defense is to not use tt-rss in your URL to access your TT-RSS reader. To do this on your hosting account, use a folder name other than tt-rss while installing TT-RSS. On your Linux home server, edit /etc/tt-rss/apache.conf and change the first /tt-rss to something else. An example is shown below.
TT-RSS Rename URL
TT-RSS Rename URL
After making the change, restart your TT-RSS and Apache to apply the changes:
sudo service tt-rss restart
sudo serivce apache2 reload
Your TT-RSS reader is now available through the new URL (example: http://mydomain.com/myreader) only.
Amazon Kindle Fire HDX
2. Enable SSL
Accessing TT-RSS through http sends all information as unencrypted data. This could mean less privacy due to potential sniffing. The solution is to encrypt the data during transfer, which makes sniffing by hackers harder. To enable and enforce HTTPS access on Linux servers with Apache, install the following run-time libraries:
sudo apt-get install libssl0.9.8 libpam0g openssl
Restart your Apache server as shown above. You should now be able to access your TT-RSS reader with HTTPS. Note that you may have to have a SSL certificate generated. Refer to Apache documentation if you want to generate your own certificate. By default, the system will install self-signed certificates for you. These certificates are likely to raise warnings when you point your browser to the site.
3. Disable Single User Mode
By default the single user mode is already disabled (in /etc/tt-rss/config.php). Enabling single user mode will also disable TT-RSS login system. Therefore, keep the single user mode disabled.
Disable Single User Mode
Disable Single User Mode
A better way to make it a single user system is by limiting the number of registrations to 1 as described below. For whatever reason, you still want to enable single user mode, make sure you implement Apache Authentication method described below.
4. Self Registrations
Self registrations allow a visitor to register themselves, which could reduce TT-RSS security. If your TT-RSS will be for personal use only, then you may want to disable user registration by setting âENABLE_REGISTRATIONâ to âfalseâ.
TT-RSS Self Registrations
TT-RSS Self Registrations
To further secure TT-RSS Reader, uou may also want to change âREG_MAX_USERSâ to â1â to make your account the only account on TT-RSS.
asus n66uASUS RT-N66U Dual-Band Wireless-N900 Gigabit Router
asus n66u reviewsFind out why it is rated the best wireless router in its class.
5. Apache Authentication
Last but not the least, enable Authentication. This is even more important if you have enabled âSingle User Modeâ describe above. Every time you access TT-RSS, you will be asked for a username and password as shown in the picture below:
Secure TT-RSS Reader
On your hosting account this equivalent to password protecting a directory, in this case the TT-RSS directory. To do this on your Ubuntu server, you will have to create a .htpasswd file. More information is available in Apache documentation. But the easiest way to achieve this is to use one of the htpasswd generators available online.
After you enter the username and password two code blocks will be generated. Copy the contents of the .htpasswd code block and save it to /etc/apache2/.htpasswd_ttrss. Next, copy the contents of the .htaccess code block and add it to /etc/tt-rss/apache.conf as shown below:
TT-RSS Apache Authentication
TT-RSS Apache Authentication
Save and exit. Restart both TT-RSS and Apache previous shown above. You should be prompted for a password every time you try to access TT-RSS. Some may think that this double authentication method is an extra inconvenience. But I would rather be safe than sorry.
Go ahead, secure Tiny Tiny RSS Reader and enjoy reading articles on your private secure RSS Reader.
878 Paul's Extreme Sound Stretch
This is a program for stretching the audio. It is suitable only for extreme sound stretching of the audio (like 50x) and for applying special effects by "spectral smoothing" the sounds. It can transform any sound/music to a texture. The program is Open-Source and it's released under the version 2 of the General Public License. You can download the source code for Linux or the Windows binaries.
Please note that this is suitable only for extreme time stretching (e.g. if have a melody of 3 minutes and you want to listen it in 3 hours). If you want "less extreme" time stretching, you can use a program which contains the SoundTouch library.
812 ED102 - Octave-Volts-Hertz
The ED102 borrows heavily from the Korg MS-02â˘ although it was developed independently of Korg Inc.
Korg and MS-02 are the trademarks of Korg Inc.
Among presently available music synthesizers, there are two different types of control system used for controlling devices such as the VCO (voltage controlled oscillator) and VCF (voltage controlled filter). These two systems been: Hertz/Volt (Hz/V) and Octave/Volt (Oct/V).
The graph to the left shows the relationship between the VCO oscillator frequency (pitch) and the control voltage (keyboard output voltage). The straight line on the graph is from a synthesizer in which there is a one octave change for every one volt change in the control voltage (Oct/V). In contrast, the curved line on the graph is the control voltage from a synthesizer in which the VCO frequency is proportional to voltage (Hz/V system).
To allow these systems to work together you will need a module like this ED102. The built-in, fully adjustable log amp and anti-log amp ensure complete system flexibility and compatibility between any presently voltage controlled synthesiser.
The Hz/V system
In the Hz/V system, the VCO oscillator frequency is proportional to the control voltage so that, for example, if the frequency of a VCO increases by 100Hz for every volt applied, then applying 1V, 2V and 3V to this VCO would generate 100Hz, 200Hz and 300Hz respectively.
The Oct/V system
In the Oct/V system the VCO oscillator frequency changes one octave for every one volt change in the control voltage so that, for example, 1V, 2V and 3V to a VCO would generate 200Hz, 400Hz and 800Hz respectively.
Features and Functions
This changes a Hz/V type keyboard CV (control voltage) output into an OCT/V type of CV. Use the Log Amp to change the control signal from, say, a Korg or Yamaha synthesiser into a signal you can use with another type of synthesizer.
This changes an OCT/V type of keyboard CV output into a Hz/V type of CV. Use this Antilog Amp when you want to control, say, a Korg synthesiser by means of a unit that uses the OCT/V system.
727 How To Create an Antique Mirror Effect | Apartment Therapy DC
How To Create an Antique Mirror Effect
Mclain Wiesand, a Baltimore-based custom furniture company, has made a name for itself by producing handcrafted pieces that capture the feel of real antiques. One of the techniques they use for aging mirror is wonderfully simple and serves as the inspiration for this how to.
Creating an antique mirror effect is an inexpensive way to revamp a flea market find, or add a new layer of interest and depth to an ordinary wall mirror. Almost any type of mirror can be aged using this technique, including mirrored plexiglass.
â˘ Mirrored glass or plexiglass. Due to the type of paint applied to the reflective coating, inexpensive, craft-store mirror works wonderfully.
â˘ Latex or other gloves for hand protection.
â˘ Paint stripper. Most types work fine. For a less toxic product, Citristrip works well.
â˘ Plastic putty spreader or putty knife.
â˘ Modern Masters Metal Effects Black Patina. This patina solution is essentially an acid that eats at the reflective surface of the mirror. There are probably other products that work similarly, but Modern Masters products work well and can be found online or in most art supply stores or specialty paint stores.
â˘ 1â chip brush (or similar brush).
â˘ Silver paint of choice.
Step 1: (Image 2, above)
Wearing gloves, place mirror face down on cardboard or other protected surface in a well-ventilated area. Apply stripper generously to back of mirror and allow to sit for a few hours, or until paint can be easily removed with plastic scraper. It is not necessary for all of the paint to be removed; generally speaking, 80-90% should suffice. When paint has been stripped, wash mirror with soap and water and allow to dry.
Step 2: (Images 3 & 4)
Place stripped mirror face down on clean cardboard or other protected surface. Dip chip brush in Modern Masters Metal Patina Solution and gradually apply it to the raw reflective surface of the mirror. As mirror tends to age from the edges inward, it is best to apply patina solution in heavier amounts around the edges of the mirror. In a matter of minutes (or less), the patina solution will begin to eat away at the reflective surface. Other application techniques that produce nice effects are spattering and light directional brushing of patina solution. Continue applying solution until desired level of ageing is achieved. Rinse with water to neutralize the reaction and allow to dry.
Step 3: (photos 5 & 6)
This next step involves reapplying paint to the back of the mirror. The color paint you choose will be visible through the spots created by the patina solution. The dark areas of aged antique mirrors tend to be a dark silver-grey but depending on the silvering technique used, can range from gold to pale silver to black. One method that produced nice results is a combination of dark and light silver paints, applied randomly (per images). Apply paint until the reflective surface is completely covered.
720 Common Security Mistakes in Web Applications - Smashing Magazine
Web application developers today need to be skilled in a multitude of disciplines. Itâs necessary to build an application that is user friendly, highly performant, accessible and secure, all while executing partially in an untrusted environment that you, the developer, have no control over. I speak, of course, about the User Agent. Most commonly seen in the form of a web browser, but in reality, one never really knows whatâs on the other end of the HTTP connection.
There are many things to worry about when it comes to security on the Web. Is your site protected against denial of service attacks? Is your user data safe? Can your users be tricked into doing things they would not normally do? Is it possible for an attacker to pollute your database with fake data? Is it possible for an attacker to gain unauthorized access to restricted parts of your site? Unfortunately, unless weâre careful with the code we write, the answer to these questions can often be one weâd rather not hear.
Weâll skip over denial of service attacks in this article, but take a close look at the other issues. To be more conformant with standard terminology, weâll talk about Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), Phishing, Shell injection and SQL injection. Weâll also assume PHP as the language of development, but the problems apply regardless of language, and solutions will be similar in other languages.
Sound synthesis and sound design
Music has brought pleasure and entertainment to mankind throughout the whole of history. Each person is by nature equipped with one of the most elaborate and emotional musical instruments; the human voice. Whenever people feel good music seems to fit the occasion, and it is considered quite natural to hum or sing a song. Musical instruments have brought their own moods to music and at the current moment in human evolution there is an enormous variety of musical instruments available. The twentieth century has seen the development of a range of new and exciting electronic musical instruments. These electronic instruments are very flexible, they can produce a wide range of timbres and can be amplified to whatever loudness level sounds best for the occasion. Most of these electronic instruments are played by a keyboard, but in essence the keyboard can be replaced by any electromechanical device that is able to transform a movement caused by a human interaction into an electrical signal that can drive the sound generating core of the electronic instrument.
All sorts of technical and scientific developments have helped to create electronic instruments and the human interface to play them. Still, music is an art and not really a hard science, although music and sound have for a long time been subject to various scientific research. An important realization is that science can not really explain why much music is such a pleasure to listen to and such a joy to make. Which is not a bad thing, as probably no one is waiting for science to take the fun out of music by applying formalized rules and templates on what is also subject to âfeelâ. So, although this book covers techniques that lean heavily on scientific research, the application of these techniques will in general be aimed at creating fun. There are a lot of professionals working with sound and even more people that make music for their personal enjoyment. Mastery of sound synthesis is valuable to all of them. Still, it wonât be easy to please everyone with one single book, as some people will be more interested in how things work and others might want practical examples that just work. The aim of this book is that it can at least be used as a practical guide in workshops and courses in electronic music, covering some essential basics that are needed to operate the equipment used in sound synthesis in a way that makes some sense. Additionally it can be used to explore techniques to find out how they can help in the development of oneâs own musical style.
Sound synthesis is the art of creating sounds by using suitable electronic means, using either analog or digital electronic devices. Sound design is the art of creating particular sounds using sound synthesis techniques. The definition of sound design as used here might be confusing to some, as the name sound design is also used in the discipline in industrial design that occupies itself with how mass produced objects should sound. Examples are how the sound of cars or ladyshaves are âdesignedâ to sound pleasing while in use. Which of course has nothing to do at all with music or sound synthesizers. This book puts the emphasis on the various synthesis techniques for musical purposes and how to setup sound synthesizers to create a large range of characteristic musical sounds. The art of musical sound design is left to the artist.
363 45 Photoshop Actions To Enhance Your Photos And Stand Out | Graphic and Web Design Blog
In this article youĂ˘ÂÂre going to find 45 sets of actions that help you enhance the colors and the main look of the photo.
Actions come really handy when you have a need to enhance your photos, but you just donât have a time for it or necessary skills. Photoshop actions contain various adjustment layers, filters, effects, who are originally recorded by author and you can play them back again. You can create actions yourself or you can just download professional ones here and get amazing results with just once click!
Explore how the action is built, choose which adjustments you want to apply and finally just enjoy great results. In this article youâre going to find 45 sets of actions that help you enhance the colors and change the main look of Your photo.
101 - 201