Skip to main content

Home/ Groups/ Larvata
1More

React Server - 0 views

  •  
    "Blazing fast page load and seamless navigation."
1More

ajbrock/Neural-Photo-Editor: A simple interface for editing natural photos with generat... - 0 views

  •  
    "A simple interface for editing natural photos with generative neural networks."
1More

BurntSushi/ripgrep: ripgrep combines the usability of The Silver Searcher with the raw ... - 1 views

shared by crazylion lee on 22 Oct 16 - No Cached
  •  
    "ripgrep combines the usability of The Silver Searcher with the raw speed of grep." -- 這套數據上看起來比ag 快一些
1More

UniversalCodeGrep by gvansickle - 1 views

  •  
    "Easy as Ack, Faster than grep" -- 這套好像是王者......
1More

attic-labs/noms: The versioned, forkable, syncable database - 0 views

  •  
    "The versioned, forkable, syncable database"
1More

Caddy - The HTTP/2 Web Server with Fully Managed TLS - 1 views

  •  
    "The HTTP/2 web server with automatic HTTPS "
1More

slick - the last carousel you'll ever need - 1 views

  •  
    "the last carousel you'll ever need"
1More

donnemartin/gitsome: A supercharged Git/GitHub command line interface (CLI). An officia... - 0 views

  •  
    "A supercharged Git/GitHub command line interface (CLI). An official integration for GitHub and GitHub Enterprise."
1More

TagSpaces - Your Hackable File Organizer - 0 views

  •  
    "TagSpaces is an open source personal data manager. It helps you organize and browse your files on every platform."
1More

Figma: the collaborative interface design tool. - 0 views

  •  
    "The first interface design tool with real-time collaboration. Figma keeps everyone on the same page. Focus on the work instead of fighting your tools. "
1More

Flynn - The product that ops provides to developers - 1 views

  •  
    "Flynn is an open source platform (PaaS) for running applications in production. It does everything you need, out of the box:"
1More

Leaflet - a JavaScript library for interactive maps - 0 views

  •  
    "an open-source JavaScript library for mobile-friendly interactive maps"
1More

naptha/tesseract.js: Pure Javascript OCR for 62 Languages - 0 views

  •  
    "Pure Javascript OCR for 62 Languages"
23More

Ask HN: What are the best practises for using SSH keys? | Hacker News - 0 views

  • Make sure you use full disk encryption and never stand up from your machine without locking it, and make sure you keep your local machine patched.
  • I'm more focused on just stealing your keys from you regardless of length
  • attacks that aren't after your keys specifically, e.g. your home directory gets stolen.
  • ...19 more annotations...
  • ED25519 is more vulnerable to quantum computation than is RSA
  • best practice to be using a hardware token
  • to use a yubikey via gpg: with this method you use your gpg subkey as an ssh key
  • sit down and spend an hour thinking about your backup and recovery strategy first
  • never share a private keys between physical devices
  • allows you to revoke a single credential if you lose (control over) that device
  • If a private key ever turns up on the wrong machine, you *know* the key and both source and destination machines have been compromised.
  • centralized management of authentication/authorization
  • I have setup a VPS, disabled passwords, and setup a key with a passphrase to gain access. At this point my greatest worry is losing this private key, as that means I can't access the server.What is a reasonable way to backup my private key?
  • a mountable disk image that's encrypted
  • a system that can update/rotate your keys across all of your servers on the fly in case one is compromised or assumed to be compromised.
  • different keys for different purposes per client device
  • fall back to password plus OTP
  • relying completely on the security of your disk, against either physical or cyber.
  • It is better to use a different passphrase for each key but it is also less convenient unless you're using a password manager (personally, I'm using KeePass)
  • - RSA is pretty standard, and generally speaking is fairly secure for key lengths >=2048. RSA-2048 is the default for ssh-keygen, and is compatible with just about everything.
  • public-key authentication has somewhat unexpected side effect of preventing MITM per this security consulting firm
  • Disable passwords and only allow keys even for root with PermitRootLogin without-password
  • You should definitely use a different passphrase for keys stored on separate computers,
  •  
    "Make sure you use full disk encryption and never stand up from your machine without locking it, and make sure you keep your local machine patched"
« First ‹ Previous 881 - 900 of 1422 Next › Last »
Showing 20 items per page