ROX Desktop - Security http://localhost/desktop/taxonomy/term/28/0 Security and protection. en Programming in E, one year on http://localhost/desktop/node/959 <p> E is a "secure distributed pure-object platform and p2p scripting language". I've been writing programs in E for a little over a year now. Here's a quick summary of the cool features I've found so far in this surprisingly overlooked little language. </p> <p><a href="http://localhost/desktop/node/959" target="_blank">read more</a></p> http://localhost/desktop/node/959#comments Developers Networking Security Sat, 16 Oct 2010 19:35:03 +0000 Thomas Leonard 959 at http://localhost/desktop Klik to Zero Install http://localhost/desktop/node/290 <p>I've tried installing <a href='http://klik.atekon.de/'>Klik</a> twice in the past, but the site was down both times. A <a href='http://osnews.com/comment.php?news_id=14274'>osnews.com</a> article prompted me to try it again and this time I got it installed.</p> <p>Klik's main advantage over <a href='http://0install.net'>Zero Install</a> is the large number of packages available for it. Its main disadvantage is that it's totally insecure. However, I've written <a href='http://0install.net/tests/klik/klik2zero'>klik2zero</a>, a little Python script that creates Zero Install packages automatically from Klik ones.</p> <p><a href="http://localhost/desktop/node/290" target="_blank">read more</a></p> http://localhost/desktop/node/290#comments Installation Security Tue, 11 Apr 2006 20:18:40 +0000 Thomas Leonard 290 at http://localhost/desktop New toy: plash http://localhost/desktop/node/244 <p>I've been spending a bit of time <a href='http://thread.gmane.org/gmane.comp.file-systems.zero-install.devel/1124'>playing with PLASH</a>. <a href='http://plash.beasts.org/'>Plash</a> is a shell which grants the programs it runs access only to certain files. For example:</p> <pre>$ cat text</pre><p> Because <i>text</i> appears on the command-line, the cat command is given read access to it (and nothing else). To get write access, you put =&gt; before the filename:</p> <pre>$ rm text /bin/rm: cannot remove `text': Permission denied $ rm =&gt; text $ </pre><p> You can also give a process access to a file (or directory structure) without also passing its name as an argument. List such files after +, e.g.:</p> <p><a href="http://localhost/desktop/node/244" target="_blank">read more</a></p> http://localhost/desktop/node/244#comments Security Thu, 26 Jan 2006 21:42:14 +0000 Thomas Leonard 244 at http://localhost/desktop GPG keys and instructions http://localhost/desktop/GPG <p><strong>GPG</strong> is the GNU Privacy Guard.</p> <p>In an effort to reduce the chance of someone breaking into SourceForge (as has happened before) and quietly changing the code (which hasn't), all software source releases have <i>GPG signatures</i>.</p> <p>To check a file, you need to get my public key (below) and the GPG signature for the file you downloaded. Assuming the key hasn't been tampered with too, GPG can check that the downloaded file is identical to the one I signed.</p> <p><a href="http://localhost/desktop/GPG" target="_blank">read more</a></p> http://localhost/desktop/GPG#comments Security Thu, 05 Jan 2006 20:22:56 +0000 Thomas Leonard 138 at http://localhost/desktop