These are my links for 26 feb 2014 through 3 mar 2014:
Introducing Kite ! – Kite is a gmail clone you can install on a server of your own. It's pretty limited for the moment, but I hope to get something usable in the next few months.
Mailpile: Let’s take e-mail back! – Mailpile is email software (an app) that runs on your desktop or laptop computer. You interact with the program using your web browser. The goal of Mailpile is to allow people to send e-mail in a more secure and private manner than before.
Authenticating other services against AD – SambaWiki – Maybe you finished setting up your new/migrated samba4 domain and having now the job to hook up several other services to Active Directory or LDAP. Then you will find here a place for configuration examples. Please keep in mind, that some of the examples here may only work on specific plattforms and/or distributions and have to be adapted.
Eight Ways to Blacklist with Apache\’s mod_rewrite | Perishable Press – With the imminent release of the next series of (4G) blacklist articles here at Perishable Press, now is the perfect time to examine eight of the most commonly employed blacklisting methods achieved with Apache’s incredible rewrite module, mod_rewrite. In addition to facilitating site security, the techniques presented in this article will improve your understanding of the different rewrite methods available with mod_rewrite.
These are my links for 18 feb 2014 from 01:19 to 22:32:
SubGit :: Svn To Git Migration – What is SubGit SubGit is tool for a smooth, stress-free Svn to Git migration. Create writable Git mirror of a local or remote Subversion repository and use both Subversion and Git as long as you like. Version 2.0 of SubGit introduces support for a remote Subversion repositories, so that to build a Git mirror, no shell access to Subversion repository is required (see complete release notes for a new version). [...] You may use SubGit for evaluation purposes without a registration as long as you like. During that evaluation period SubGit will remind you on a necessity of registration with the help of post commit and post receive messages.
Apache Tips & Tricks: Deny access to some folders – MDLog:/sysadmin – Applies: apache 1.3.x / apache 2.0.x Required apache module: mod_access Scope: global server configuration, virtual host, directory, .htaccess Type: security Description: How to deny access to certain folders and the files inside them. Useful: to deny access to certain folders containing private information (log files, source code, password files, etc.). The example shown here will address the question posted by Saul Howard on how to deny access to all the subversion directories (.svn).
Polipo — a caching web proxy – Wikipedia: Polipo is a lightweight forwarding and caching web proxy server. Polipo is HTTP 1.1-compliant, supports IPv4, IPv6, traffic filtering and privacy-enhancement. To minimize latency, Polipo both pipelines multiple resource requests and multiplexes multiple transactions onto the same TCP/IP connection. Polipo is free software released under the MIT License. It runs on GNU/Linux, OpenWrt, Microsoft Windows, Mac OS X, and FreeBSD. Polipo can be configured to use on-disk cache and serve cached content when offline and perform various forms of content filtering[...] E può usare upstream proxy socks… per chi se ne intende
These are my links for 23 gen 2014 through 24 gen 2014:
Pancake HTTP Server – What is Pancake? Pancake is a lightweight and modern HTTP server that comes with its own PHP Server API and interfaces for FastCGI and AJP13. With its modern server architecture Pancake is capable of handling very high concurrency loads along with many other features – try it out!
GitLab: Self Hosted Git Management Application – GitLab is open source software to collaborate on code. Create projects and repositories, manage access and do code reviews. GitLab allows you to keep your code secure on your own server manage repositories, users and access permissions communicate through issues, line-comments and wiki pages perform code review with merge requests GitLab is powered by Ruby on Rails completely free and open source (MIT license) used by more than 25.000 organizations to keep their code secureGitLab is open source software to collaborate on code. Create projects and repositories, manage access and do code reviews.
Hardening the Linux server – Summary: Servers — whether used for testing or production — are primary targets for attackers. By taking the proper steps, you can turn a vulnerable box into a hardened server and help thwart outside attackers. Learn how to tighten Secure Shell (SSH) sessions, configure firewall rules, and set up intrusion detection to alert you to possible attacks on your GNU/Linux® server.
These are my links for 14 giu 2013 through 18 giu 2013:
apache2-mpm-itk – apache2-mpm-itk (just mpm-itk for short) is an MPM (Multi-Processing Module) for the Apache web server. mpm-itk allows you to run each of your vhost under a separate uid and gid—in short, the scripts and configuration files for one vhost no longer have to be readable for all the other vhosts. mpm-itk is based on the traditional prefork MPM, which means it's non-threaded; in short, this means you can run non-thread-aware code (like many PHP extensions) without problems. On the other hand, you lose out to any performance benefit you'd get with threads, of course; you'd have to decide for yourself if that's worth it or not. You will also take an additional performance hit over prefork, since there's an extra fork per request. [ via http://bastian.rieck.ru/blog/posts/2012/secure_owncloud_installation/ ]
iTerm2 – Mac OS Terminal Replacement – iTerm2 is a replacement for Terminal and the successor to iTerm. It works on Macs with OS 10.5 (Leopard) or newer. Its focus is on performance, internationalization, and supporting innovative features that make your life better.
Introducing Pysa – Reverse your servers’ configurations! | MadeiraCloud – We are excited to announce the Alpha release of our new open-source configuration reverse engineering tool: Pysa Pysa aims to help anyone who wants to replicate an existing configuration and not simply clone the entire machine. It can be use to migrate configurations from one computer to another (as physical machines to virtual clouds), backup existing configurations, or for any other migration purpose.