-
-
vps_setup
... upgrades
+ IPv6 is enabled - if an IPv6 address is given - in the following configurations
* Network Interfaces
* Hosts
* DNS
* Firewall (`ip6tables`)
* SSH
###Nginx
TBD
###What is not Setup?
+ *Java* - Due to the amount of extra ...
-
work_allocation
... a locally significant application.
== Security
A few notes about security
* This is application is designed to run behind a firewall and does not employ standard suite of authentication measures.
* User management is ...
-
jftp
... .
JFTP integrates the most widely used and widely accepted security mechanism,
SSL (Secured Sockets Layer), to securely transfer your ... commands (standard or custom) soon after log in
###Proxy/Firewall
JFTP gives you the ability to connect through proxy ...
-
concussionjs-core
... love the technology and want to deploy it behind my firewall" to "I have drunk the kool aid, and now ... alternatives, in particular AngularJS (www.angularjs.org)
* Integrating better security and identity management
* Improving admin console's support for ...
-
large-domain
... on the left, or you can create it on the Configure Firewall screen when creating instances. The important thing is to open ... created earlier, in my case kkhan-ec2
3) Configure firewall: Choose the security group you created earlier
"Launch instance" will ...
-
TodoBundle
... .yml
GreenFrogTodoBundle:
resource: "@GreenFrogTodoBundle/Controller/"
type: annotation
```
Configure firewall to make app only available by logged in users
``` yaml
# app/config/security.yml
security:
access_control:
- { path: ...
-
platform_external_netcat
... are many and varied here; if such things are intended as
security mechanisms, it may be best to modify netcat specifically for ... e " resulted
from a need to quietly bypass a firewall installation. Other suggestions and
patches have rolled in for which ...
-
UCE
... RMI. That allows building RMI
applications over NAT and firewall boundaries.
## Contents
All modules and bundles are located in a ... would be nice, although most UPnP implementations have severe
security issues and should not really be activated. It is ...
-
PHPDocumentor
... Allowing your server
to write files to disk is a serious security risk, and phpDocumentor is not
designed to work on insecure systems. Setup php on a development machine
that has a firewall or no internet connection, and run phpDocumentor from there.
...
-
LswRemoteTemplateBundle
... located in the “sf2” sub-directory of the Symfony1 project.
The attribute reflects the name of the Symfony2 firewall. The code of the Symfony2AuthenticationFilter
is this:
``` php
function symfony2_autoload ($pClassName)
{
$sf2Paths = sfConfig::get(' ...
-