ROX Desktop - Security
http://localhost/desktop/taxonomy/term/28/0
Security and protection.enProgramming in E, one year on
http://localhost/desktop/node/959
<p>
E is a "secure distributed pure-object platform and p2p scripting language".
I've been writing programs in E for a little over a year now. Here's
a quick summary of the cool features I've found so far in this surprisingly overlooked
little language.
</p>
<p><a href="http://localhost/desktop/node/959" target="_blank">read more</a></p>http://localhost/desktop/node/959#commentsDevelopersNetworkingSecuritySat, 16 Oct 2010 19:35:03 +0000Thomas Leonard959 at http://localhost/desktopKlik to Zero Install
http://localhost/desktop/node/290
<p>I've tried installing <a href='http://klik.atekon.de/'>Klik</a> twice in the past, but the site was down both times. A <a href='http://osnews.com/comment.php?news_id=14274'>osnews.com</a> article prompted me to try it again and this time I got it installed.</p>
<p>Klik's main advantage over <a href='http://0install.net'>Zero Install</a> is the large number of packages available for it. Its main disadvantage is that it's totally insecure. However, I've written <a href='http://0install.net/tests/klik/klik2zero'>klik2zero</a>, a little Python script that creates Zero Install packages automatically from Klik ones.</p>
<p><a href="http://localhost/desktop/node/290" target="_blank">read more</a></p>http://localhost/desktop/node/290#commentsInstallationSecurityTue, 11 Apr 2006 20:18:40 +0000Thomas Leonard290 at http://localhost/desktopNew toy: plash
http://localhost/desktop/node/244
<p>I've been spending a bit of time <a href='http://thread.gmane.org/gmane.comp.file-systems.zero-install.devel/1124'>playing with PLASH</a>. <a href='http://plash.beasts.org/'>Plash</a> is a shell which grants the programs it runs access only to certain files. For example:</p>
<pre>$ cat text</pre><p>
Because <i>text</i> appears on the command-line, the cat command is given read access to it (and nothing else). To get write access, you put => before the filename:</p>
<pre>$ rm text
/bin/rm: cannot remove `text': Permission denied
$ rm => text
$
</pre><p>
You can also give a process access to a file (or directory structure) without also passing its name as an argument. List such files after +, e.g.:</p>
<p><a href="http://localhost/desktop/node/244" target="_blank">read more</a></p>http://localhost/desktop/node/244#commentsSecurityThu, 26 Jan 2006 21:42:14 +0000Thomas Leonard244 at http://localhost/desktopGPG keys and instructions
http://localhost/desktop/GPG
<p><strong>GPG</strong> is the GNU Privacy Guard.</p>
<p>In an effort to reduce the chance of someone breaking into SourceForge (as has happened before) and quietly changing the code (which hasn't), all software source releases have <i>GPG signatures</i>.</p>
<p>To check a file, you need to get my public key (below) and the GPG signature for the file you downloaded. Assuming the key hasn't been tampered with too, GPG can check that the downloaded file is identical to the one I signed.</p>
<p><a href="http://localhost/desktop/GPG" target="_blank">read more</a></p>http://localhost/desktop/GPG#commentsSecurityThu, 05 Jan 2006 20:22:56 +0000Thomas Leonard138 at http://localhost/desktop