Search Content

Displaying 1 - 20 of 43

… addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> …

… a link to a How-To to implement checking for Yahoo domain keys: Postfix with dkfilter (DomainKeys Implementation) Add … a link to a How-To to implement checking for Yahoo domain keys: Postfix with dkfilter (DomainKeys Implementation) … …

… pricing, so our migration skips those rows. The key thing is that there are 5 pairs of columns for the …   delimiter: ','   enclosure: '"'   header_row_count: 1   keys:     - ItemCode     - PriceCodeRecord   track_changes: … the source $row object in the migration, for processing. keys need to specify a field or set of fields that uniquely …

… discovered sooner rather than later -- or have all private keys also encrypt to a law-enforcement's key, so that law-enforcement can decrypt it. But what if your … easily attacked via social engineering, and these secret keys revealed? Having a skeleton key like this becomes a much …

… certificates and revoke the old ones, in case the private keys for the certificates were compromised. We have notified … that you get an entirely new certificate with a new key. Why? Because it's possible the private key that secures … part still relies on one more step -- revoking any old keys and certificates that might have been stolen. The …

… with them to create user content subscription access keys for individuals and groups – in order to see special … with them to create user content subscription access keys for individuals and groups – in order to see special …

… Browsers show the organization name in a green bar in the lock section. Device/key verification Riot/Matrix, PGP You … that puts your organization name in green next to the lock. Encryption is becoming ubiquitous, now, and it's easier … Browsers show the organization name in a green bar in the lock section. Device/key verification Riot/Matrix, PGP You …

… use one-time login links instead of passwords, require SSH keys for access to production systems, have multiple … use one-time login links instead of passwords, require SSH keys for access to production systems, have multiple …

… nothing in return. regards. bizworldusa Reply Add new comment You must have JavaScript enabled to use this form. … me when new comments are posted All comments Replies to my comment Comment About text formats Filtered HTML Web page …

… to a new point release of Drupal means merging the new tag into our branch. Then we've written a script to update … and the development copy on develop. And it created a git tag for the particular release. On production, we have … back to development and re-roll the release. git log/git tag -- identify the current state of the code base -- should …

… cheese. WordPress core has a reasonably competent security team watching over it. But the > 54,000 plugins available in the WP repository? You're on your own. The security team might handle working with a plugin author if they get … seriously. Compared to WordPress, the Drupal security team covers not just Drupal core, but also thousands of …

… panel with vulnerabilities A WYSIWYG editor with file upload capabilities not managed by Drupal A compromised user … running CMSs on shared servers all the time, using FTP to upload files. This is horribly insecure in the first place, … panel with vulnerabilities A WYSIWYG editor with file upload capabilities not managed by Drupal A compromised user …

… give them full access to your site, allow an attacker to upload malicious code, steal data, damage your site, whatever … give them full access to your site, allow an attacker to upload malicious code, steal data, damage your site, whatever …

… so that's what I hope to illuminate here. Read the comments inline... /** * Implements hook_views_data(). */ … or get refactored into a different module. Reply Add new comment You must have JavaScript enabled to use this form. … me when new comments are posted All comments Replies to my comment Comment About text formats Filtered HTML Web page …

… It turns out that another vendor had posted an AWS API key to a public Github server! This is like putting your … use. Worst Case Scenario A malicious attacker, with an API key granting sufficient access to an AWS account, can shut … site down. They had gotten the notice about the published key, went into the account and shut off every server they …

… chart showing the same data, but aggregated for the entire team. And finally after that are individual pie charts for each team member showing their hours per project. Two date … set date ranges in the distant past when we had different team members, more individual pies get added for them as …

… House burns down PDA gets stolen Virus infects your files, and your recent backups Which of these disasters could … data. Loss of data, including corrupt backups, deleted files, or important files you change accidentally. The … the structure of each database is regularly exported to a file and added to my document repository. The document …

… Wire by Gazoo (not verified) Permalink Hi, Hi, Just to comment on When I read that RIOT will allow you to see if … just those who have chosen the same island. Reply Add new comment You must have JavaScript enabled to use this form. … me when new comments are posted All comments Replies to my comment Comment About text formats Filtered HTML Web page …

… based on what the site is doing for the business? The key point here is that when a client uses a technology we are … based on what the site is doing for the business? The key point here is that when a client uses a technology we are …

… Ubuntu openvpn packages include easy-rsa at /usr/share/doc/openvpn/examples/easy-rsa cd into easy-rsa/ Edit vars as … Server-Routed cd /etc/openvpn Copy server.conf from docs, and unpack. cp /etc/capath/keys/ca.crt . cp … Copy client.key, client.crt, ca.crt, and client.conf from docs into a tarball and transfer to client. Edit client.conf …