100SILEX, de 0 ŗ 100 s: server
1522 5 Simple steps to secure TT-RSS reader
secure tt-rss, tt-rss security
5 Simple steps to secure TT-RSS reader
July 27, 2015 by Anand Leave a Comment
Share: share htpcBeginner
We recently presented Tiny Tiny RSS to you as a great alternative to Google reader, which is one more way you can extend the functionality of your home server or your hosting space. Hopefully, you already exported your data from Google Reader. In this post, we will show you how to secure TT-RSS reader to prevent unauthorized access. Tiny Tiny RSS is an open source web-based news feed (RSS/Atom) reader and aggregator, designed to allow you to read news from any location, while feeling as close to a real desktop application as possible. As we previously explained, it makes an ideal candidate to replace Google Reader. While there are services like Feedly and Newsblur grabbing the crowd Google Reader, which some of you may prefer, there are a group of people who would like to run a RSS reader on their own server and keep things private. Assuming that you have already installed Tiny Tiny RSS on your alternative to Google reader or hosting space, we will now show you how to secure TT-RSS reader.
Secure TT-RSS Reader
One of the main reasons to move to an RSS aggregator like TT-RSS is maintaining your privacy. So if you do not secure TT-RSS reader well you are not only making your data available public but also making your system vulnerable to potential attacks. Choosing a strong username and password while setting your TT-RSS is the first basic thing that you can do to secure TT-RSS reader. Listed below are few more ways you can increase TT-RSS reader‚Äôs security.
1. Rename TT-RSS Folder
One of the first lines of defense is to not use tt-rss in your URL to access your TT-RSS reader. To do this on your hosting account, use a folder name other than tt-rss while installing TT-RSS. On your Linux home server, edit /etc/tt-rss/apache.conf and change the first /tt-rss to something else. An example is shown below.
TT-RSS Rename URL
TT-RSS Rename URL
After making the change, restart your TT-RSS and Apache to apply the changes:
sudo service tt-rss restart
sudo serivce apache2 reload
Your TT-RSS reader is now available through the new URL (example: http://mydomain.com/myreader) only.
Amazon Kindle Fire HDX
2. Enable SSL
Accessing TT-RSS through http sends all information as unencrypted data. This could mean less privacy due to potential sniffing. The solution is to encrypt the data during transfer, which makes sniffing by hackers harder. To enable and enforce HTTPS access on Linux servers with Apache, install the following run-time libraries:
sudo apt-get install libssl0.9.8 libpam0g openssl
Restart your Apache server as shown above. You should now be able to access your TT-RSS reader with HTTPS. Note that you may have to have a SSL certificate generated. Refer to Apache documentation if you want to generate your own certificate. By default, the system will install self-signed certificates for you. These certificates are likely to raise warnings when you point your browser to the site.
3. Disable Single User Mode
By default the single user mode is already disabled (in /etc/tt-rss/config.php). Enabling single user mode will also disable TT-RSS login system. Therefore, keep the single user mode disabled.
Disable Single User Mode
Disable Single User Mode
A better way to make it a single user system is by limiting the number of registrations to 1 as described below. For whatever reason, you still want to enable single user mode, make sure you implement Apache Authentication method described below.
4. Self Registrations
Self registrations allow a visitor to register themselves, which could reduce TT-RSS security. If your TT-RSS will be for personal use only, then you may want to disable user registration by setting ‚ÄúENABLE_REGISTRATION‚ÄĚ to ‚Äúfalse‚ÄĚ.
TT-RSS Self Registrations
TT-RSS Self Registrations
To further secure TT-RSS Reader, uou may also want to change ‚ÄúREG_MAX_USERS‚ÄĚ to ‚Äú1‚ÄĚ to make your account the only account on TT-RSS.
asus n66uASUS RT-N66U Dual-Band Wireless-N900 Gigabit Router
asus n66u reviewsFind out why it is rated the best wireless router in its class.
5. Apache Authentication
Last but not the least, enable Authentication. This is even more important if you have enabled ‚ÄúSingle User Mode‚ÄĚ describe above. Every time you access TT-RSS, you will be asked for a username and password as shown in the picture below:
Secure TT-RSS Reader
On your hosting account this equivalent to password protecting a directory, in this case the TT-RSS directory. To do this on your Ubuntu server, you will have to create a .htpasswd file. More information is available in Apache documentation. But the easiest way to achieve this is to use one of the htpasswd generators available online.
After you enter the username and password two code blocks will be generated. Copy the contents of the .htpasswd code block and save it to /etc/apache2/.htpasswd_ttrss. Next, copy the contents of the .htaccess code block and add it to /etc/tt-rss/apache.conf as shown below:
TT-RSS Apache Authentication
TT-RSS Apache Authentication
Save and exit. Restart both TT-RSS and Apache previous shown above. You should be prompted for a password every time you try to access TT-RSS. Some may think that this double authentication method is an extra inconvenience. But I would rather be safe than sorry.
Go ahead, secure Tiny Tiny RSS Reader and enjoy reading articles on your private secure RSS Reader.
1520 Universal Media Server
1439 target 3001 Versions et prix - IBF-Wiki
1411 Homelab - server at home
1407 Homelab - server at home - Graver un PCB de fa√ßon efficace et bon march√©
- La lampe halog√®ne du salon
- Les tubes n√©ons √† ultraviolets
- Les diodes LED √† ultraviolets
Voici mon bac √† U.V.
Il n est pas beau, mais est parfaitement fonctionnel !
Ding-Ding !!! Le temps est √©coul√©, coupez votre bac √† U.V. et passez √† l √©tape 2 - La r√©v√©lation.
De la soude caustique ou du d√©boucheur √©viers c est pareil et le second est peut √™tre moins cher !
Une fois votre solution bien m√©lang√©e, plongez y votre circuit insol√©.
Agitez doucement le bac en plastique pour que la solution produise tout son effet.
Agitez le bac jusqu √† ce que vous soyez certain que tout le vernis ai disparu de la plaque insol√©e.
Votre solution transparente va devenir bleu√Ętre durant la phase de dissolution du vernis (c est √† cause du vernis)
1307 The document that officially put the World Wide Web into the public domain on 30 April 1993. - CERN Document Server
domaine publique, public domain, web, computer
Twenty years of a free, open web
On 30 April 1993 CERN published a statement that made World Wide Web technology available on a royalty free basis, allowing the web to flourish
On 30 April 1993 CERN published a statement that made World Wide Web ("W3", or simply "the web") technology available on a royalty-free basis. By making the software required to run a web server freely available, along with a basic browser and a library of code, the web was allowed to flourish.
1304 SQL Server Helper - Tips and Tricks - Date Formats
SQL Server,SQL,SQL Server 2005,Maximum Capacity
1282 Lotus Notes/Domino - Tools and utilities for Administrators and Users.
VirtualObjectives provides IT consulting services for Microsoft SQL Server administration, Tools and utilities for Windows environments, and Lotus Notes/Domino databases/utilities for system administrators.
virtual,objectives,lotus,notes,domino,database,utility,utilities,program,application,free,freeware,windows,development,john buoro,notes.ini,notesini,killnotes,stopnotes,moontool,log analyser,log analyzer,analyser,analyzer,sendsmtp,mail box cleaner,notesrepair,repair notes,repair lotus notes,repair,compact,desktop,workspace,desktop6.ndk,error code,text formatting,text tools,csv,col2csv,col2tab,csv2tab,tab2csv,csv2html,html2csv,csv2xml,xml2csv,epolicy,policy,netware quota,user registration,id store,partcopy,stopnotes,killnotes,recover,password,mame,frontend,mamerunner,emulator,partcopy,sql server,clean drive pro,clean drive,dts,dts package,sql,sql server,script,rconsole
1280 LoudBlog - Podcasting Software for PHP
LoudBlog: Easy Audioblogging and Podcasting on your PHP-server
LoudBlog, Podcasting, Audioblogging, Vlog, Software, Publish, RSS, PHP
1209 WJunction - Webmaster Forum!
wjunction, webmasters, hosting, seedbox, rapidleech, servers, uploaders, uploading, uploaded, cyberlocker, server, admin, forums, websites, coding, programming, money, marketing
1205 Remove Logos or Watermarks From Video with VirtualDub and DeLogo Filter - WJunction - Webmaster Forum!
This is tutorial how to remove logo or watermark Download Videodub Code: http://virtualdub.sourceforge.net/ Download delogo filter Code: http://neuron2
Remove,Logos,Watermarks,Video,VirtualDub,DeLogo,Filter, Remove Logos or Watermarks From Video with VirtualDub and DeLogo Filter, wjunction, webmasters, hosting, seedbox, rapidleech, servers, uploaders, uploading, uploaded, cyberlocker, server, admin, forums, websites, coding, programming, money, marketing
1136 Serviio media server
Serviio is a free media server for Window, Mac and Linux. It enables streaming video, audio and images to your DLNA certified device.
DLNA, dlna, free, 'dlna server', serviio, Serviio, UPNP, media, server, 'media server', Mac, Linux, xbox, playstation, ps3, video, streaming, samsung, bravia, LG
992 Troy Hunt: Who‚Äôs who of bad password practices ‚Äď banks, airlines and more
Troy Hunt on observations, musings and conjecture about the world of software and technology
Troy Hunt, blog, .NET, Azure, Backup, Bing, Blogger, Career Development, Code Quality, Conference, Database, Design Utopia, DotNetNuke, Enterprise Software Platform, Internet Explorer, iPhone, K2, LinkedIn, Media, NDepend, Online Identity, OWASP, People Management, Personal Development, Product Review, ReSharper, Security, SharePoint, Silverlight, Software Quality, SQL Injection, SQL Server, Subversion, Travel, Twitter, Visual Studio, Windows Mobile, XSS,
Ah, passwords. Love ‚Äėem or hate ‚Äėem, they‚Äôre a necessary evil of the digital age. The reality is we all end up with an alphabet soup of passwords spread over dozens of various sites and services across the internet. Whilst we might not always practice it, we all know the theory of creating a good password; uniqueness, randomness and length. The more of each, the better.
Of course we frequently don‚Äôt do this because of all sorts of human factors such as convenience, memory or simple unawareness of the risks. Still, when it‚Äôs a case of individuals electing not to create secure passwords, they really only have themselves to blame.
But what happens when the website won‚Äôt allow you to create a secure password? Or at least when they severely constrain your ability to create long, random, unique passwords? And what about when they don‚Äôt allow you to send it between your computer and their server securely?
Even worse, what happens when our most ‚Äúsecure‚ÄĚ institutions implement lazy password policies? Unfortunately, all of this is pretty rampant practice.
741 17 Useful Htaccess Tricks and Tips
I have collected 17 htaccess methods in this article which I have used or tested it before, and I think some of them are essential tricks and tips to protect your webserver against malicious attacks and other would able to perform simple tasks efficiently such as redirection and web server optimization.
queness,kevin liew,tips, tools
674 Remove Complex Backgrounds from Images in Photoshop - How-To Geek
While tools like the Magic Eraser can sometimes remove your backgrounds, the fact is you're going to have to get your hands dirty with the eraser if you have images with complex backgrounds that need removing.
Windows, Windows Vista, Ubuntu, Programming, Networking, Firefox, Help, Solaris, Linux, Unix, VMware ,SQL Server, Oracle, MySQL, Analytics, Suse, Redhat, network security, firewall, postgresql,database, how to, how-to, howto, hints, tips, shell scripts, system administration
637 50 List of Free Online Photo Editing Tools | blueblots.com
Editing an image is very popular these days due to the innovation of graphic software programs that will allow us to create computer arts from scratch. However, we could also enhance, add some cool effects and customize the look of our images easily without having the need of these soft wares through the online photo editors. An online photo editor tool allows us to edit and manipulate a photo in the Web Browser. This is more advantageous compared to the softwares for editing an image as this could not consume much of the memory of your desktop and the processing is done faster by the server. With just a few clicks, we could now be able to customize our own photos, create funny photos from our pictures or even feature ourselves in a magazine cover like that of a celebrity. Here are the 50 List of Photo Editing Tools to Help You Edit Images and Photos Online for free. Try to check and get your best pick!
474 Why Intelligent People Fail
Why Intelligent People Fail
Content from Sternberg, R. (1994). In search of the human mind. New York: Harcourt Brace.
1. Lack of motivation. A talent is irrelevant if a person is not motivated to use it. Motivation may be external (for example, social approval) or internal (satisfaction from a job well-done, for instance). External sources tend to be transient, while internal sources tend to produce more consistent performance.
2. Lack of impulse control. Habitual impulsiveness gets in the way of optimal performance. Some people do not bring their full intellectual resources to bear on a problem but go with the first solution that pops into their heads.
3. Lack of perserverance and perseveration. Some people give up too easily, while others are unable to stop even when the quest will clearly be fruitless.
4. Using the wrong abilities. People may not be using the right abilities for the tasks in which they are engaged.
5. Inability to translate thought into action. Some people seem buried in thought. They have good ideas but rarely seem able to do anything about them.
6. Lack of product orientation. Some people seem more concerned about the process than the result of activity.
7. Inability to complete tasks. For some people nothing ever draws to a close. Perhaps it‚Äôs fear of what they would do next or fear of becoming hopelessly enmeshed in detail.
8. Failure to initiate. Still others are unwilling or unable to initiate a project. It may be indecision or fear of commitment.
9. Fear of failure. People may not reach peak performance because they avoid the really important challenges in life.
10. Procrastination. Some people are unable to act without pressure. They may also look for little things to do in order to put off the big ones.
11. Misattribution of blame. Some people always blame themselves for even the slightest mishap. Some always blame others.
12. Excessive self-pity. Some people spend more time feeling sorry for themselves than expending the effort necessary to overcome the problem.
13. Excessive dependency. Some people expect others to do for them what they ought to be doing themselves.
14. Wallowing in personal difficulties. Some people let their personal difficulties interfere grossly with their work. During the course of life, one can expect some real joys and some real sorrows. Maintaining a proper perspective is often difficult.
15. Distractibility and lack of concentration. Even some very intelligent people have very short attention spans.
16. Spreading oneself too think or too thick. Undertaking too many activities may result in none being completed on time. Undertaking too few can also result in missed opportunities and reduced levels of accomplishment.
17. Inability to delay gratification. Some people reward themselves and are rewarded by others for finishing small tasks, while avoiding bigger tasks that would earn them larger rewards.
18. Inability to see the forest for the trees. Some people become obsessed with details and are either unwilling or unable to see or deal with the larger picture in the projects they undertake.
19. Lack of balance between critical, analytical thinking and creative, synthetic thinking. It is important for people to learn what kind of thinking is expected of them in each situation.
20. Too little or too much self-confidence. Lack of self-confidence can gnaw away at a person‚Äôs ability to get things done and become a self-fulfilling prophecy. Conversely, individuals with too much self-confidence may not know when to admit they are wrong or in need of self-improvement.
464 Ksplice ¬Ľ Attack of the Cosmic Rays! - System administration and software blog
It‚Äôs a well-documented fact that RAM in modern computers is susceptible to occasional random bit flips due to various sources of noise, most commonly high-energy cosmic rays. By some estimates, you can even expect error rates as high as one error per 4GB of RAM per day! Many servers these days have ECC RAM, which uses extra bits to store error-correcting codes that let them correct most bit errors, but ECC RAM is still fairly rare in desktops, and unheard-of in laptops.
For me, bitflips due to cosmic rays are one of those problems I always assumed happen to ‚Äúother people‚ÄĚ. I also assumed that even if I saw random cosmic-ray bitflips, my computer would probably just crash, and I‚Äôd never really be able to tell the difference from some random kernel bug.
A few weeks ago, though, I encountered some bizarre behavior on my desktop, that honestly just didn‚Äôt make sense. I spent about half an hour digging to discover what had gone wrong, and eventually determined, conclusively, that my problem was a single undetected flipped bit in RAM. I can‚Äôt prove whether the problem was due to cosmic rays, bad RAM, or something else, but in any case, I hope you find this story interesting and informative.
418 RAISERROR (Transact-SQL)
Generates an error message and initiates error processing for the session. RAISERROR can either reference a user-defined message stored in the sys.messages catalog view or build a message dynamically. The message is returned as a server error message to the calling application or to an associated CATCH block of a TRY‚Ä¶CATCH construct.
417 Sql Server 2005 - S√©lectionner la n-√®me valeur de chaque √©l√©ment d'un groupe transact sql
Blog de CLT-Services : vie de l'entreprise et infos pratiques
357 LiVES Video Editing System - Because the media should be open
LiVES - Open media and free video editing and VJ software for Linux
media lives video editor linux
BSD IRIX OpenMosix music multimedia free open source
gnu GPL h264 x264 edition instal final cut premier
¬í¬ī¬Ī¬í√¶¬¶ ¬í¬ī¬Ī¬í√ä√Ĺ¬í√¶¬¶¬í√£√ę ¬Ď√ä√ď¬Ď√Ü¬Ķ¬Ď¬Ī√†¬Ď¬ľ¬≠¬í¬ī√Į ŚģėÁĹĎ ŚģėśĖĻÁĹĎÁęô
¬Ď√ä√ď¬Ď√Ü¬Ķ ¬Ď¬Ī√†¬Ď¬ľ¬≠ ¬í¬ľ¬ę¬í√ć¬≥¬í√Ö¬™ ¬Ď√ą√≠¬í¬∑√Į ¬Ď¬Ķ√ß¬í¬Ī√Ü ¬í¬≤√ą ¬í√Ä¬ł¬Ď¬≤√ļ ¬í√ā¬Ņ¬í√á√ě¬í√ā√é
OSX darwin hdv snow xvid FOSS FLOSS jack clip resize resample
home capture display convert audio production dvd mp3 solaris
ogg wav editing software freeware avi vcd svcd anime film movie divx
mpeg matroska ubuntu debian mandriva redhat slackware fedora
suse gentoo unix codec logiciel grab merge trim dvgrab dv hdv studio
vob asf mpeg2 crop montaggio modificare dirac theora vorbis
best good newest fastest sourceforge stream download project site
professional quality pro powerful frame descargar feature multitrack
simple composite composer real time realtime server
encode encoder plugin effect tool nonlinear linear non-linear
program animated gif jpeg png vj OSC sound control remote network
sex porn pr0n
330 iSendr - On Demand P2P File Transfers
iSendr lets you send files to anyone with an internet connection via an on demand p2p direct connection for free! Your file goes straight from you to its destination-- no server space required.
isendr,p2p,direct connect,send,send file,large file,transfer,dc,upload
215 VirtualBox Virtual Appliances | VirtualBoxImages.com
VirtualBox Virtual Appliances
Total Activated Virtual Computers: 30,262
VDI images of pre-installed "Open Source" Operating System distros. Pre-installed virtualbox images ready for you to explore and play with.
VirtualBox runs on SunOS, OpenSolaris, Mac OS X, Windows, OS/2 and Linux.
It's a computer inside your computer.
Looking for OVFAppliances.com
SugarSync Cloud Storage
FREE Virtual Appliances available in the SugarSync Cloud.
Direct HTTP download, no torrent client required. You receive 2Gig of FREE Cloud Storage
Instantly run another operating system on your desktop in a window, on almost any computer.
Implement full Linux functionality on an existing Windows Desktop or server.
Windows XP Tutorial: 7 quick steps to using our VDI's
Need a specific Application? Find an Image using the Pre-Installed Applications Index
A number of Virtual Machines are also available in OVF Appliance" format
165 SQL Server Join Examples
I am new to SQL Server and want to learn about the JOIN options. What are all of the JOIN options in SQL Server? What is the significance of each of the options? I am a little confused on the differences and syntax, can you provide some examples and ex
138 10 Positions a Eviter avec un Netbook
Vous avez r√©cemment achet√© un ultra-portable ou vous √™tes sur le point d'en acqu√©rir un pour No√ęl ? Alors il est grand temps d'observer quelques pr√©cautions d'usage pour √©viter quelques d√©sagr√©ments d'ordre physique. Voici donc en image, les dix positions les plus dommageables lors de l'utilisation d'un Netbook. Les points rouges correspondent aux zones douloureuses, vous l'aurez compris !
Cette √©tude tr√®s s√©rieuse men√©e par le professeur Dave Malouf est parrain√©e par Freescale.
101 - 201