11 月 292010
 

2010-11-26 来源:阮一峰博客

有人在Stack Overflow上发问,动手开发网站之前,需要知道哪些事情?不出意料地,他得到了一大堆回答。

通常情况下,你需要把所有人的发言从头到尾读一遍。但是,Stack Overflow有一个很贴心的设计,它允许在问题下方开设一个wiki区,让所有人共同编辑一个最佳答案。于是,就有了下面这篇文章,一共总结出六个方面共计62条“网站开发须知”。

我发现,这种概述性的问题,最适合这种集合群智、头脑风暴式的回答方式了。这也是我第一次觉得,Stack Overflow做到了Wikipedia做不到的事。(难怪它最近挤进了全美前400大网站。)

在我的印象中,关于网站开发,这样全面的概述性文章非常少见,因此也就非常有用。大家不妨看看,62件事情中你做到了多少?

一、界面和用户体验(Interface and User Experience)

1.1、知道各大浏览器执行Web标准的情况,保证你的站点在主要浏览器上都能正常运行。你至少要测试以下引擎:Gecko(用于 Firefox)、Webkit(用于Safari、Chrome和一些手机浏览器)、IE(你可以利用微软发布的Application Compatibility VPC Images进行测试)和Opera。同时,不同的操作系统,可能也会影响浏览器如何呈现你的网站。

1.2、除了浏览器,网站还有其他使用方式:手机、屏幕朗读器、搜索引擎等等。你应该知道在这些情况下,你的网站的运行状况。MobiForge提供了手机网站开发的一些相关知识。

1.3、知道如何在基本不影响用户使用的情况下升级网站。通常来说,你必须有版本控制系统(CVS、Subversion、Git等等)和数据备份机制(backup)。

1.4、不要让用户看到那些不友好的出错提示。 Continue reading »

11 月 292010
 

Protocol Security Summary
by Peter Mueller

PPTP is known to be a faulty protocol. The designers of the protocol, Microsoft, recommend not to use it due to the inherent risks. Lots of people use PPTP anyway due to ease of use, but that doesn't mean it is any less hazardous. The maintainers of PPTP Client and Poptop recommend using OpenVPN (SSL based) or IPSec instead.

(Posted on 2005-08-10 to the mailing list)

Why not use PPTP?
by James Cameron

The point to point tunneling protocol (PPTP) is not secure enough for some information security policies.

It's the nature of the MSCHAP V2 authentication, how it can be broken trivially by capture of the datastream, and how MPPE depends on the MSCHAP tokens for cryptographic keys. MPPE is also only 128-bit, reasonably straightforward to attack, and the keys used at each end are the same, which lowers the effort required to succeed. The obvious lack of two-factor authentication, instead relying on a single username and password, is also a risk. The increasing use of domestic wireless systems makes information capture more likely.

However, that doesn't mean people don't accept the risks. There are many corporations and individuals using PPTP with full knowledge of these risks. Some use mitigating controls, and some don't. Continue reading »

11 月 282010
 

北京时间2010年11月27日消息,美国国土安全部下属的移民和海关执法局(Immigration and Customs Enforcement,以下简称“ICE”)本周关闭了多家非法文件分享网站。

本次关闭的网站既有托管盗版电影和音乐的网站,也有帮助用户从其他地方搜索非法内容的网站。当用户访问这些网站域名时,会看到警告信息:“根据一家美国地区法院发布的扣押令,该域名已被ICE国土安全调查科查获。”

通过查获这些网站的域名,美国政府已经将其所有访客重新定位到他们自己的声明页面。

ICE发言人克里·巴赛特(Cori W. Bassett)在声明中说:“ICE国土安全调查科针对多个域名执行了法院发布的扣押令。由于这是一起持续调查,因此目前还不能透露更多细节。”

本次被查扣的域名包括BT种子网站torrent-finder.com和其他3家音乐网站:onsmash.com、 rapgodfathers.com和dajaz1.com。但BT新闻博客TorrentFreak表示,至少还有其他70家网站也被查封,其中多数都从事假冒服装、DVD等商品的买卖。

本周五,BT用户已经开始讨论一些新的种子网站。

在今年6月的一起专门打击互联网假冒和盗版产品的专项行动中,美国政府也曾经发布过类似的公告。但巴赛特拒绝透露这次行动是否是上次行动的延续。

在浏览器地址栏输入被关闭的域名后,会出现以下图片提示.

11 月 232010
 

Version 1.0
Author: Falko Timme
Last edited: 02/07/2006

In this HowTo I will show how to install and configure DenyHosts. DenyHosts is a tool that observes login attempts to SSH, and if it finds failed login attempts again and again from the same IP address, DenyHosts blocks further login attempts from that IP address by putting it into /etc/hosts.deny. DenyHosts can be run by cron or as a daemon. In this tutorial I will run DenyHosts as a daemon.

From the DenyHosts web site:

“DenyHosts is a script intended to be run by Linux system administrators to help thwart ssh server attacks.

If you've ever looked at your ssh log (/var/log/secure on Redhat, /var/log/auth.log on Mandrake, etc…) you may be alarmed to see how many hackers attempted to gain access to your server. Hopefully, none of them were successful (but then again, how would you know?). Wouldn't it be better to automatically prevent that attacker from continuing to gain entry into your system?

DenyHosts attempts to address the above… “

This tutorial is based on a Debian Sarge system, however, it should apply to other distributions with almost no modifications.

I want to say first that this is not the only way of setting up such a system. There are many ways of achieving this goal but this is the way I take. I do not issue any guarantee that this will work for you! Continue reading »

11 月 192010
 

2010-11-19 来源:第一财经周刊  CBN记者 朱小坤 实习记者 王海伦 霍然

网络世界里到处都是保证书,因为这里到处都是错误。

郑昀再一次在《行政执法通知书》上签下名字,按上手印。离开谈话室,他想再不应该到这里来了。北京市广渠门内白桥大街22号,北京市(政府)新闻办公室,是网站管理的几个核心部门之一。

这是在2009年年底。在此之前,郑昀已经陆陆续续被找去谈话了5次。每一次对方都会拿出一些打印好的网站截图,批评他又做错了什么,问他准备怎么整改。郑昀则必须做出口头保证,“一定加强管理。”之后他被要求在一份《行政执法通知书》上按手印—不是每次都需要签名,但每次肯定要按手印。回了公司,郑昀还要尽快把公司整改措施的实施情况写邮件汇报给相关部门,这样算走完了一个流程。

郑昀是玩聚网的创始人之一和CEO。玩聚网创建于2006年,它主要追踪IT业界人士使用的各种社会化媒体分享源,如微博客、阅读器分享、网摘收藏等,综合分享推荐的次数、推荐者权重和信息源类型等多种因素,自动聚合然后推荐。该网站2008年推出了玩聚SR(SNS搜索引擎),很快在IT圈内获得一批用户。按照郑昀的想法,这个网站将在“自动发现热点”方面做到中国第一。

曾任新浪科技频道主编的曹增辉最初并不看好玩聚网,SR改变了他的看法,他在博客里写道:“上周推出的玩聚SR,终于让人眼前一亮。”曹增辉认为玩聚SR正好解决了blog缺乏聚合平台的短板。 Continue reading »

11 月 142010
 

测试结论备忘
环境:ubuntu server 9.04
nginx+mysql+fastcgi

1、单独Zend Optimizer优化:
测试结果很不稳定,偏差很大,加速并不多。

2、单独eAccelerator(做为Zend扩展)优化:
测试结果稳定,偏差小,加速也明显。

3、eAccelerator和Zend Optimizer共存:
测试结果稳定,偏差小,加速明显。比单独eAccelerator优化好。

4、单独Xcache优化:
测试结果稳定,偏差小,加速不如单独eAccelerator。

5、Xcache和Zend Optimizer共存:
测试结果稳定,偏差小,加速不如单独eAccelerator。
Xcache就算关闭保护功能,速度也没提升多少。

11 月 142010
 

Q. Can you explain me log files in Ubuntu Linux and how do I view logs?
A. All logs are stored in /var/log directory under Ubuntu (and other Linux distro).

Linux Log files and usage

=> /var/log/messages : General log messages
=> /var/log/boot : System boot log
=> /var/log/debug : Debugging log messages
=> /var/log/auth.log : User login and authentication logs
=> /var/log/daemon.log : Running services such as squid, ntpd and others log message to this file
=> /var/log/dmesg : Linux kernel ring buffer log
=> /var/log/dpkg.log : All binary package log includes package installation and other information
=> /var/log/faillog : User failed login log file
=> /var/log/kern.log : Kernel log file
=> /var/log/lpr.log : Printer log file
=> /var/log/mail.* : All mail server message log files
=> /var/log/mysql.* : MySQL server log file
=> /var/log/user.log : All userlevel logs
=> /var/log/xorg.0.log : X.org log file
=> /var/log/apache2/* : Apache web server log files directory
=> /var/log/lighttpd/* : Lighttpd web server log files directory
=> /var/log/fsck/* : fsck command log
=> /var/log/apport.log : Application crash report / log file

11 月 122010
 

狗爹目前支持.org, .eu, .biz 和 .us域名的DNSSEC安全扩展. com 和 net域名估计还要再等等啊,至少是2011年下半年了.

by GoDaddy Employee JacqueM on August 17th, 2010

We currently support DNSSEC for .org, .eu, .biz., and .us domain name extensions. The registry for .com and .net, VeriSign (R), doesn’t support DNSSEC for these extensions yet, but they’re working on it. As soon as they make DNSSEC possible for .com and .net, we plan to be right there with them to support it!