CARVIEW |
Earn Rewards, Reputation, and Badges
Redeem the reputation points you've earned from participating in O'Reilly Answers for O'Reilly books, videos, courses, and conferences.
Topics: security
Feed subscription
Email subscription
Questions Only Feed
Questions Only Email

Please sign in or register to post.

Please sign in or register to post.
-
Removing personal data from a Google Nexus phone
By mike-loukides: 14 February 2010 - 11:11 AM
I received a used Nexus phone, complete with someone else's personal data, even though the SIMM had been removed. (No, I didn't look.) I knew that there was a "reset" command that ...
-
Keep SSH Sessions Active, Or Reconnect?
By lazyweb: 04 February 2010 - 04:43 PM
Over on Slashdot user borjonx writes "Is it safer to log out of an SSH session, and re-establish it later, or just keep the connection open? Like many of you, I use OpenSSH to connect to my Slack...
-
nmap on the iphone
Asked by mike-loukides : 20 January 2010 - 08:54 AM
Answered by msilver: Feb 05 2010 08:09 AM
If you search for "nmap" on the Apps Store you find IP Network Scanner For iPhone which seems like it is what you're looking for. There's a light version which only shows you five ma... full answer >
-
Is it standard practice to give the web user apache full read/write/execute privileges to the files and folders within the webroot?
Asked by TekZombie : 09 January 2010 - 09:22 PM
Answered by TekZombie: Jan 12 2010 06:42 PM
The following URL provided the information I needed: https://httpd.apache....urity_tips.html In summary, the answer is no. Root should be the owner of the files/folders within your webroot. Then, Apa... full answer >
-
-
Will Google Chrome do better than other browsers on security?
Asked by FloatingBones : 08 December 2009 - 08:37 PM
Tags:
-
How do I create memorable, but secure Passwords?
Asked by jonjohns65 : 11 November 2009 - 02:07 PM
Answered by adfm: Nov 11 2009 02:29 PM
Creating a decent password you can remember can be a pain. Here's an earlier post that gives some great suggestions from John Viega's Myths of Security. full answer >
-
How to Close Down Open Ports and Block Protocols
By alockhart: 27 October 2009 - 10:42 PM
Firewalls can protect your PC and your network from intruders. But if you don’t want to use a firewall and you still want protection, you can manually close down ports and block protocols. Some of ...
-
-
How to make mutt NOT add a PGP/GPG signature to a specific email address
By tcpiplab: 09 October 2009 - 12:34 PM
If you use the awesomely versatile and lightening fast mutt email client and you have it set to cryptographically sign each outgoing message by default using PGP or the free and rock solid GPG, then y...
![]() ©2009, O'Reilly Media, Inc. (707) 827-7000 / (800) 998-9938 All trademarks and registered trademarks appearing on oreilly.com are the property of their respective owners. |
About O'Reilly Academic Solutions Authors Contacts Customer Service Jobs Newsletters O'Reilly Labs Press Room Privacy Policy RSS Feeds Terms of Service User Groups Writing for O'Reilly |
Content Archive Business Technology Computer Technology Microsoft Mobile Network Operating System Digital Photography Programming Software Web Web Design |
More O'Reilly Sites O'Reilly Radar Ignite Tools of Change for Publishing Digital Media Inside iPhone makezine.com craftzine.com hackszine.com perl.com xml.com Partner Sites InsideRIA java.net O'Reilly Insights on Forbes.com |