lnxw48 (Linux Walt) on fresh.federati.net
This remote profile is registered on another site; see lnxw48's original profile page on fresh.federati.net.
-
lnxw48 (Linux Walt) (lnxw48)'s status on Monday, 16-Feb-2015 18:42:53 EST
lnxw48 (Linux Walt)
#OurSQL podcast interviews !security guru Bruce Schneier http://url.federati.net/2ui73 #MySQL -
lnxw48 (Linux Walt) (lnxw48)'s status on Sunday, 15-Feb-2015 14:11:59 EST
lnxw48 (Linux Walt)
Forgot the link: http://url.federati.net/fjm8T
-
lnxw48 (Linux Walt) (lnxw48)'s status on Sunday, 15-Feb-2015 14:10:48 EST
lnxw48 (Linux Walt)
Bruce Schneier looks at the #Sony penetration and how aggressively deleting data is critical to organizations’ !security. Quite contrary to many organizations’ current practice of trying to preserve everything (no matter how minor or useless) for as long as possible.
-
lnxw48 (Linux Walt) (lnxw48)'s status on Saturday, 14-Feb-2015 03:55:24 EST
lnxw48 (Linux Walt)
What #GHOST tells us about free software vulnerability management http://url.federati.net/JaHE6 !security
-
lnxw48 (Linux Walt) (lnxw48)'s status on Saturday, 14-Feb-2015 02:58:46 EST
lnxw48 (Linux Walt)
@rozzin Bunch of jerks, it seems. Another reason for me to prefer optical media over theater visits.
-
lnxw48 (Linux Walt) (lnxw48)'s status on Wednesday, 11-Feb-2015 00:04:42 EST
lnxw48 (Linux Walt)
@benfell @bobjonkman @rozzin Yes, they did at CSUSB in the middle #1990s.
-
lnxw48 (Linux Walt) (lnxw48)'s status on Tuesday, 10-Feb-2015 22:56:23 EST
lnxw48 (Linux Walt)
-
lnxw48 (Linux Walt) (lnxw48)'s status on Tuesday, 10-Feb-2015 22:56:00 EST
lnxw48 (Linux Walt)
@bobjonkman @rozzin I suspect it has to do with your #TinFoilHat ... trying to imply that someone claiming unemployment figures are “a big lie” is as believable as a conspiracy theorist. (NOTE: Anyone that has had intermediate-level economics classes knows the figures are deceptive at best, and indeed, that changes made in 1994 made them even less a reflection of reality.)
-
lnxw48 (Linux Walt) (lnxw48)'s status on Tuesday, 10-Feb-2015 01:06:26 EST
lnxw48 (Linux Walt)
@roland Oh, @gomerx has been around a long time. He’s probably !selfhost ed his instance at least 3 years.
-
lnxw48 (Linux Walt) (lnxw48)'s status on Monday, 09-Feb-2015 22:21:50 EST
lnxw48 (Linux Walt)
-
lnxw48 (Linux Walt) (lnxw48)'s status on Thursday, 22-Jan-2015 16:36:30 EST
lnxw48 (Linux Walt)
By the way, if you’re thinking about running !sn / !gnusocial on #lighttpd, the included
lighttpd.conf.examplefile makes it very easy to get things running. #nginx, #cherokee, #hiawatha users should contribute similar files, to make it even easier to !selfhost. -
lnxw48 (Linux Walt) (lnxw48)'s status on Tuesday, 20-Jan-2015 03:40:08 EST
lnxw48 (Linux Walt)
Apparently, #DNSSEC is not so secure after all. http://url.federati.net/lqoBx #DNS !Security /via #PumpIO
——- -
lnxw48 (Linux Walt) (lnxw48)'s status on Sunday, 18-Jan-2015 16:39:26 EST
lnxw48 (Linux Walt)
@roland @mmn @erkanyilmaz I think a better solution is to let the fullname (user@host) override shortnames (@user), even when the shortname is a known account to the server.
-
lnxw48 (Linux Walt) (lnxw48)'s status on Wednesday, 14-Jan-2015 11:43:31 EST
lnxw48 (Linux Walt)
Malware that bypasses authentication on Active Directory systems that implement password only authentication. http://head4.me/2n /via Aviadax on #PumpIO. #Windows !security
-
lnxw48 (Linux Walt) (lnxw48)'s status on Monday, 12-Jan-2015 18:11:10 EST
lnxw48 (Linux Walt)
@rozzin I must admit I have not seen anything like it before. I have no idea what it is or what its purpose is.
-
lnxw48 (Linux Walt) (lnxw48)'s status on Sunday, 11-Jan-2015 22:27:19 EST
lnxw48 (Linux Walt)
Adding this to the !security group
-
lnxw48 (Linux Walt) (lnxw48)'s status on Saturday, 10-Jan-2015 23:26:05 EST
lnxw48 (Linux Walt)
@erkan @nds The (former) developer of a #Tent client (and former Tent !selfhost er) was recently grumbling about the pace of development (both the spec and their implementation). But in the past few days, some improvements made to Tent-flavored #Markdown (as deployed to their #Cupcake instance).
-
lnxw48 (Linux Walt) (lnxw48)'s status on Friday, 02-Jan-2015 23:07:11 EST
lnxw48 (Linux Walt)
@bobjonkman Unless #Darkmail uses some #P2P or broadcast mechanism to spread message, some metadata will always be exposed because it is used for message routing and delivery. This kind of overpromising by privacy-oriented projects is worrisome.
-
lnxw48 (Linux Walt) (lnxw48)'s status on Wednesday, 10-Dec-2014 21:42:35 EST
lnxw48 (Linux Walt)
@rozzin That’s not a bad short story. I like it.
-
lnxw48 (Linux Walt) (lnxw48)'s status on Sunday, 09-Nov-2014 13:30:16 EST
lnxw48 (Linux Walt)
For those who do not know, Shamir is the ‘S’ in RSA encryption.