100SILEX, de 0 100 s: server
1522 5 Simple steps to secure TT-RSS reader
secure tt-rss, tt-rss security 5 Simple steps to secure TT-RSS reader July 27, 2015 by Anand Leave a Comment secure-tt-rss-ft Share: share htpcBeginner We recently presented Tiny Tiny RSS to you as a great alternative to Google reader, which is one more way you can extend the functionality of your home server or your hosting space. Hopefully, you already exported your data from Google Reader. In this post, we will show you how to secure TT-RSS reader to prevent unauthorized access. Tiny Tiny RSS is an open source web-based news feed (RSS/Atom) reader and aggregator, designed to allow you to read news from any location, while feeling as close to a real desktop application as possible. As we previously explained, it makes an ideal candidate to replace Google Reader. While there are services like Feedly and Newsblur grabbing the crowd Google Reader, which some of you may prefer, there are a group of people who would like to run a RSS reader on their own server and keep things private. Assuming that you have already installed Tiny Tiny RSS on your alternative to Google reader or hosting space, we will now show you how to secure TT-RSS reader. Secure TT-RSS Reader One of the main reasons to move to an RSS aggregator like TT-RSS is maintaining your privacy. So if you do not secure TT-RSS reader well you are not only making your data available public but also making your system vulnerable to potential attacks. Choosing a strong username and password while setting your TT-RSS is the first basic thing that you can do to secure TT-RSS reader. Listed below are few more ways you can increase TT-RSS reader’s security. 1. Rename TT-RSS Folder One of the first lines of defense is to not use tt-rss in your URL to access your TT-RSS reader. To do this on your hosting account, use a folder name other than tt-rss while installing TT-RSS. On your Linux home server, edit /etc/tt-rss/apache.conf and change the first /tt-rss to something else. An example is shown below. TT-RSS Rename URL TT-RSS Rename URL After making the change, restart your TT-RSS and Apache to apply the changes: sudo service tt-rss restart sudo serivce apache2 reload Your TT-RSS reader is now available through the new URL (example: http://mydomain.com/myreader) only. Amazon Kindle Fire HDX 2. Enable SSL Accessing TT-RSS through http sends all information as unencrypted data. This could mean less privacy due to potential sniffing. The solution is to encrypt the data during transfer, which makes sniffing by hackers harder. To enable and enforce HTTPS access on Linux servers with Apache, install the following run-time libraries: sudo apt-get install libssl0.9.8 libpam0g openssl Restart your Apache server as shown above. You should now be able to access your TT-RSS reader with HTTPS. Note that you may have to have a SSL certificate generated. Refer to Apache documentation if you want to generate your own certificate. By default, the system will install self-signed certificates for you. These certificates are likely to raise warnings when you point your browser to the site. 3. Disable Single User Mode By default the single user mode is already disabled (in /etc/tt-rss/config.php). Enabling single user mode will also disable TT-RSS login system. Therefore, keep the single user mode disabled. Disable Single User Mode Disable Single User Mode A better way to make it a single user system is by limiting the number of registrations to 1 as described below. For whatever reason, you still want to enable single user mode, make sure you implement Apache Authentication method described below. 4. Self Registrations Self registrations allow a visitor to register themselves, which could reduce TT-RSS security. If your TT-RSS will be for personal use only, then you may want to disable user registration by setting “ENABLE_REGISTRATION” to “false”. TT-RSS Self Registrations TT-RSS Self Registrations To further secure TT-RSS Reader, uou may also want to change “REG_MAX_USERS” to “1” to make your account the only account on TT-RSS. asus n66uASUS RT-N66U Dual-Band Wireless-N900 Gigabit Router asus n66u reviewsFind out why it is rated the best wireless router in its class. 5. Apache Authentication Last but not the least, enable Authentication. This is even more important if you have enabled “Single User Mode” describe above. Every time you access TT-RSS, you will be asked for a username and password as shown in the picture below: Secure TT-RSS Reader On your hosting account this equivalent to password protecting a directory, in this case the TT-RSS directory. To do this on your Ubuntu server, you will have to create a .htpasswd file. More information is available in Apache documentation. But the easiest way to achieve this is to use one of the htpasswd generators available online. After you enter the username and password two code blocks will be generated. Copy the contents of the .htpasswd code block and save it to /etc/apache2/.htpasswd_ttrss. Next, copy the contents of the .htaccess code block and add it to /etc/tt-rss/apache.conf as shown below: TT-RSS Apache Authentication TT-RSS Apache Authentication Save and exit. Restart both TT-RSS and Apache previous shown above. You should be prompted for a password every time you try to access TT-RSS. Some may think that this double authentication method is an extra inconvenience. But I would rather be safe than sorry. Go ahead, secure Tiny Tiny RSS Reader and enjoy reading articles on your private secure RSS Reader.
http://www.htpcbeginner.com/secure-tt-rss-reader/

1520 Universal Media Server

http://www.universalmediaserver.com/

1439 target 3001 Versions et prix - IBF-Wiki

http://server.ibfriedrich.com/wiki/ibfwikifr/index.php/Versions_et_prix

1411 Homelab - server at home
radio,electronique,radioamateurisme,experiences,antennes,satellite,projets,decouverte,x-ray,electricite
http://www.homelab.be/index.php?Page=PCB

1407 Homelab - server at home - Graver un PCB de façon efficace et bon marché
L insolation - La lampe halogène du salon - Les tubes néons à ultraviolets - Les diodes LED à ultraviolets Voici mon bac à U.V. Il n est pas beau, mais est parfaitement fonctionnel ! Ding-Ding !!! Le temps est écoulé, coupez votre bac à U.V. et passez à l étape 2 - La révélation. La révélation De la soude caustique ou du déboucheur éviers c est pareil et le second est peut être moins cher ! Une fois votre solution bien mélangée, plongez y votre circuit insolé. Agitez doucement le bac en plastique pour que la solution produise tout son effet. Agitez le bac jusqu à ce que vous soyez certain que tout le vernis ai disparu de la plaque insolée. Votre solution transparente va devenir bleuâtre durant la phase de dissolution du vernis (c est à cause du vernis)
http://www.homelab.be/index.php?Page=PCB

1307 The document that officially put the World Wide Web into the public domain on 30 April 1993. - CERN Document Server
domaine publique, public domain, web, computer
https://cds.cern.ch/record/1164399

1306 Cern
Twenty years of a free, open web On 30 April 1993 CERN published a statement that made World Wide Web technology available on a royalty free basis, allowing the web to flourish On 30 April 1993 CERN published a statement that made World Wide Web ("W3", or simply "the web") technology available on a royalty-free basis. By making the software required to run a web server freely available, along with a basic browser and a library of code, the web was allowed to flourish.
http://info.cern.ch/

1304 SQL Server Helper - Tips and Tricks - Date Formats
SQL Server,SQL,SQL Server 2005,Maximum Capacity
http://www.sql-server-helper.com/tips/date-formats.aspx

1282 Lotus Notes/Domino - Tools and utilities for Administrators and Users.
VirtualObjectives provides IT consulting services for Microsoft SQL Server administration, Tools and utilities for Windows environments, and Lotus Notes/Domino databases/utilities for system administrators. virtual,objectives,lotus,notes,domino,database,utility,utilities,program,application,free,freeware,windows,development,john buoro,notes.ini,notesini,killnotes,stopnotes,moontool,log analyser,log analyzer,analyser,analyzer,sendsmtp,mail box cleaner,notesrepair,repair notes,repair lotus notes,repair,compact,desktop,workspace,desktop6.ndk,error code,text formatting,text tools,csv,col2csv,col2tab,csv2tab,tab2csv,csv2html,html2csv,csv2xml,xml2csv,epolicy,policy,netware quota,user registration,id store,partcopy,stopnotes,killnotes,recover,password,mame,frontend,mamerunner,emulator,partcopy,sql server,clean drive pro,clean drive,dts,dts package,sql,sql server,script,rconsole
http://www.virtualobjectives.com.au/notesdomino/notesdomino-index.htm

1280 LoudBlog - Podcasting Software for PHP
LoudBlog: Easy Audioblogging and Podcasting on your PHP-server LoudBlog, Podcasting, Audioblogging, Vlog, Software, Publish, RSS, PHP
http://loudblog.com/index.php

1209 WJunction - Webmaster Forum!
Webmaster Hangout wjunction, webmasters, hosting, seedbox, rapidleech, servers, uploaders, uploading, uploaded, cyberlocker, server, admin, forums, websites, coding, programming, money, marketing
http://www.wjunction.com/

1205 Remove Logos or Watermarks From Video with VirtualDub and DeLogo Filter - WJunction - Webmaster Forum!
This is tutorial how to remove logo or watermark Download Videodub Code: http://virtualdub.sourceforge.net/ Download delogo filter Code: http://neuron2 Remove,Logos,Watermarks,Video,VirtualDub,DeLogo,Filter, Remove Logos or Watermarks From Video with VirtualDub and DeLogo Filter, wjunction, webmasters, hosting, seedbox, rapidleech, servers, uploaders, uploading, uploaded, cyberlocker, server, admin, forums, websites, coding, programming, money, marketing
http://www.wjunction.com/13-tutorials-guides/84403-remove-logos-watermarks-video-virtualdub-delogo-filter.html

1136 Serviio media server
Serviio is a free media server for Window, Mac and Linux. It enables streaming video, audio and images to your DLNA certified device. DLNA, dlna, free, 'dlna server', serviio, Serviio, UPNP, media, server, 'media server', Mac, Linux, xbox, playstation, ps3, video, streaming, samsung, bravia, LG
http://www.serviio.org/index.php

992 Troy Hunt: Who’s who of bad password practices – banks, airlines and more
Troy Hunt on observations, musings and conjecture about the world of software and technology Troy Hunt, blog, .NET, Azure, Backup, Bing, Blogger, Career Development, Code Quality, Conference, Database, Design Utopia, DotNetNuke, Enterprise Software Platform, Internet Explorer, iPhone, K2, LinkedIn, Media, NDepend, Online Identity, OWASP, People Management, Personal Development, Product Review, ReSharper, Security, SharePoint, Silverlight, Software Quality, SQL Injection, SQL Server, Subversion, Travel, Twitter, Visual Studio, Windows Mobile, XSS, Ah, passwords. Love ‘em or hate ‘em, they’re a necessary evil of the digital age. The reality is we all end up with an alphabet soup of passwords spread over dozens of various sites and services across the internet. Whilst we might not always practice it, we all know the theory of creating a good password; uniqueness, randomness and length. The more of each, the better. Of course we frequently don’t do this because of all sorts of human factors such as convenience, memory or simple unawareness of the risks. Still, when it’s a case of individuals electing not to create secure passwords, they really only have themselves to blame. But what happens when the website won’t allow you to create a secure password? Or at least when they severely constrain your ability to create long, random, unique passwords? And what about when they don’t allow you to send it between your computer and their server securely? Even worse, what happens when our most “secure” institutions implement lazy password policies? Unfortunately, all of this is pretty rampant practice.
http://www.troyhunt.com/2011/01/whos-who-of-bad-password-practices.html

741 17 Useful Htaccess Tricks and Tips
I have collected 17 htaccess methods in this article which I have used or tested it before, and I think some of them are essential tricks and tips to protect your webserver against malicious attacks and other would able to perform simple tasks efficiently such as redirection and web server optimization. queness,kevin liew,tips, tools
http://www.queness.com/post/5421/17-useful-htaccess-tricks-and-tips/

674 Remove Complex Backgrounds from Images in Photoshop - How-To Geek
While tools like the Magic Eraser can sometimes remove your backgrounds, the fact is you're going to have to get your hands dirty with the eraser if you have images with complex backgrounds that need removing. Windows, Windows Vista, Ubuntu, Programming, Networking, Firefox, Help, Solaris, Linux, Unix, VMware ,SQL Server, Oracle, MySQL, Analytics, Suse, Redhat, network security, firewall, postgresql,database, how to, how-to, howto, hints, tips, shell scripts, system administration
http://www.howtogeek.com/howto/29811/remove-complex-backgrounds-from-images-in-photoshop/

637 50 List of Free Online Photo Editing Tools | blueblots.com
Editing an image is very popular these days due to the innovation of graphic software programs that will allow us to create computer arts from scratch. However, we could also enhance, add some cool effects and customize the look of our images easily without having the need of these soft wares through the online photo editors. An online photo editor tool allows us to edit and manipulate a photo in the Web Browser. This is more advantageous compared to the softwares for editing an image as this could not consume much of the memory of your desktop and the processing is done faster by the server. With just a few clicks, we could now be able to customize our own photos, create funny photos from our pictures or even feature ourselves in a magazine cover like that of a celebrity. Here are the 50 List of Photo Editing Tools to Help You Edit Images and Photos Online for free. Try to check and get your best pick!
http://blueblots.com/tools/50-list-of-free-online-photo-editing-tools/

474 Why Intelligent People Fail
Why Intelligent People Fail Content from Sternberg, R. (1994). In search of the human mind. New York: Harcourt Brace. 1. Lack of motivation. A talent is irrelevant if a person is not motivated to use it. Motivation may be external (for example, social approval) or internal (satisfaction from a job well-done, for instance). External sources tend to be transient, while internal sources tend to produce more consistent performance. 2. Lack of impulse control. Habitual impulsiveness gets in the way of optimal performance. Some people do not bring their full intellectual resources to bear on a problem but go with the first solution that pops into their heads. 3. Lack of perserverance and perseveration. Some people give up too easily, while others are unable to stop even when the quest will clearly be fruitless. 4. Using the wrong abilities. People may not be using the right abilities for the tasks in which they are engaged. 5. Inability to translate thought into action. Some people seem buried in thought. They have good ideas but rarely seem able to do anything about them. 6. Lack of product orientation. Some people seem more concerned about the process than the result of activity. 7. Inability to complete tasks. For some people nothing ever draws to a close. Perhaps it’s fear of what they would do next or fear of becoming hopelessly enmeshed in detail. 8. Failure to initiate. Still others are unwilling or unable to initiate a project. It may be indecision or fear of commitment. 9. Fear of failure. People may not reach peak performance because they avoid the really important challenges in life. 10. Procrastination. Some people are unable to act without pressure. They may also look for little things to do in order to put off the big ones. 11. Misattribution of blame. Some people always blame themselves for even the slightest mishap. Some always blame others. 12. Excessive self-pity. Some people spend more time feeling sorry for themselves than expending the effort necessary to overcome the problem. 13. Excessive dependency. Some people expect others to do for them what they ought to be doing themselves. 14. Wallowing in personal difficulties. Some people let their personal difficulties interfere grossly with their work. During the course of life, one can expect some real joys and some real sorrows. Maintaining a proper perspective is often difficult. 15. Distractibility and lack of concentration. Even some very intelligent people have very short attention spans. 16. Spreading oneself too think or too thick. Undertaking too many activities may result in none being completed on time. Undertaking too few can also result in missed opportunities and reduced levels of accomplishment. 17. Inability to delay gratification. Some people reward themselves and are rewarded by others for finishing small tasks, while avoiding bigger tasks that would earn them larger rewards. 18. Inability to see the forest for the trees. Some people become obsessed with details and are either unwilling or unable to see or deal with the larger picture in the projects they undertake. 19. Lack of balance between critical, analytical thinking and creative, synthetic thinking. It is important for people to learn what kind of thinking is expected of them in each situation. 20. Too little or too much self-confidence. Lack of self-confidence can gnaw away at a person’s ability to get things done and become a self-fulfilling prophecy. Conversely, individuals with too much self-confidence may not know when to admit they are wrong or in need of self-improvement.
http://www.acceleratingfuture.com/michael/works/intelligentfailure.htm

464 Ksplice » Attack of the Cosmic Rays! - System administration and software blog
It’s a well-documented fact that RAM in modern computers is susceptible to occasional random bit flips due to various sources of noise, most commonly high-energy cosmic rays. By some estimates, you can even expect error rates as high as one error per 4GB of RAM per day! Many servers these days have ECC RAM, which uses extra bits to store error-correcting codes that let them correct most bit errors, but ECC RAM is still fairly rare in desktops, and unheard-of in laptops. For me, bitflips due to cosmic rays are one of those problems I always assumed happen to “other people”. I also assumed that even if I saw random cosmic-ray bitflips, my computer would probably just crash, and I’d never really be able to tell the difference from some random kernel bug. A few weeks ago, though, I encountered some bizarre behavior on my desktop, that honestly just didn’t make sense. I spent about half an hour digging to discover what had gone wrong, and eventually determined, conclusively, that my problem was a single undetected flipped bit in RAM. I can’t prove whether the problem was due to cosmic rays, bad RAM, or something else, but in any case, I hope you find this story interesting and informative.
http://blog.ksplice.com/2010/06/attack-of-the-cosmic-rays/

418 RAISERROR (Transact-SQL)
Generates an error message and initiates error processing for the session. RAISERROR can either reference a user-defined message stored in the sys.messages catalog view or build a message dynamically. The message is returned as a server error message to the calling application or to an associated CATCH block of a TRY…CATCH construct.
http://msdn.microsoft.com/en-us/library/ms178592(v=SQL.100).aspx

417 Sql Server 2005 - Sélectionner la n-ème valeur de chaque élément d'un groupe transact sql
Blog de CLT-Services : vie de l'entreprise et infos pratiques Agile,ASP.NET,C#,CSharp,CSS,Divers,Gestion de projet,iPhone,Javascript,Lectures,Linq,Moteurs de recherche,Outils et librairies,Pratique,Reporting services,RIA Services,Silverlight,SQL Server,Tests Unitaires
http://www.clt-services.com/blog/?tag=/transact+sql

357 LiVES Video Editing System - Because the media should be open
LiVES - Open media and free video editing and VJ software for Linux media lives video editor linux BSD IRIX OpenMosix music multimedia free open source gnu GPL h264 x264 edition instal final cut premier ’´±’æ¦ ’´±’Êý’榒ãë ‘ÊӑƵ‘±à‘¼­’´ï 官网 官方网站 ‘ÊӑƵ ‘±à‘¼­ ’¼«’ͳ’Ū ‘Èí’·ï ‘µç’±Æ ’²È ’À¸‘²ú ’¿’ÇޒÂÎ OSX darwin hdv snow xvid FOSS FLOSS jack clip resize resample home capture display convert audio production dvd mp3 solaris ogg wav editing software freeware avi vcd svcd anime film movie divx mpeg matroska ubuntu debian mandriva redhat slackware fedora suse gentoo unix codec logiciel grab merge trim dvgrab dv hdv studio vob asf mpeg2 crop montaggio modificare dirac theora vorbis best good newest fastest sourceforge stream download project site professional quality pro powerful frame descargar feature multitrack simple composite composer real time realtime server encode encoder plugin effect tool nonlinear linear non-linear program animated gif jpeg png vj OSC sound control remote network sex porn pr0n
http://lives.sourceforge.net/index.php?do=downloads

330 iSendr - On Demand P2P File Transfers
iSendr lets you send files to anyone with an internet connection via an on demand p2p direct connection for free! Your file goes straight from you to its destination-- no server space required. isendr,p2p,direct connect,send,send file,large file,transfer,dc,upload
http://www.isendr.com/

215 VirtualBox Virtual Appliances | VirtualBoxImages.com
VirtualBox Virtual Appliances Total Activated Virtual Computers: 30,262 VDI images of pre-installed "Open Source" Operating System distros. Pre-installed virtualbox images ready for you to explore and play with. VirtualBox runs on SunOS, OpenSolaris, Mac OS X, Windows, OS/2 and Linux. It's a computer inside your computer. Looking for OVFAppliances.com SugarSync Cloud Storage FREE Virtual Appliances available in the SugarSync Cloud. Direct HTTP download, no torrent client required. You receive 2Gig of FREE Cloud Storage Instantly run another operating system on your desktop in a window, on almost any computer. Implement full Linux functionality on an existing Windows Desktop or server. Windows XP Tutorial: 7 quick steps to using our VDI's Need a specific Application? Find an Image using the Pre-Installed Applications Index A number of Virtual Machines are also available in OVF Appliance" format
http://virtualboximages.com/

165 SQL Server Join Examples
I am new to SQL Server and want to learn about the JOIN options. What are all of the JOIN options in SQL Server? What is the significance of each of the options? I am a little confused on the differences and syntax, can you provide some examples and ex
http://www.mssqltips.com/tip.asp?tip=1667

138 10 Positions a Eviter avec un Netbook
Vous avez récemment acheté un ultra-portable ou vous êtes sur le point d'en acquérir un pour Noël ? Alors il est grand temps d'observer quelques précautions d'usage pour éviter quelques désagréments d'ordre physique. Voici donc en image, les dix positions les plus dommageables lors de l'utilisation d'un Netbook. Les points rouges correspondent aux zones douloureuses, vous l'aurez compris ! Cette étude très sérieuse menée par le professeur Dave Malouf est parrainée par Freescale.
http://www.maxigadget.com/2009/12/10-positions-eviter-avec-un-netbook.html

101 - 201