You are not logged in. Login Now
 0-24   25-49   50-74   74-98   99-123   124-148   149-173   174-198   199-219 
 
Author Message
25 new of 219 responses total.
aruba
response 99 of 219: Mark Unseen   Jan 4 16:40 UTC 2005

I'll be sending out paper receipts to people who donated to Grex last year
and would like a receipt for tax purposes.  So if you'd like a receipt for
your donations, let me know.
tsty
response 100 of 219: Mark Unseen   Jan 5 00:02 UTC 2005

thank janc and the others who made this new system and made the transition
so smooth. stunning!   applause!! applause!!
jep
response 101 of 219: Mark Unseen   Jan 5 03:30 UTC 2005

re resp:98: I notice I get a constant stream of pop-ups:

   Security Information
   This page contains both secure and nonsecure
   items.

   Do you want to display the nonsecure items?

Is this because the Backtalk buttons are accessible only via "http"?

I'd really like a fix if possible.

Thanks!
janc
response 102 of 219: Mark Unseen   Jan 5 04:18 UTC 2005

Hmmm...interesting.  I haven't looked at the code, but yes, very likely the
buttons are being fetched from a plain http URL.  However, the buttons are
not in a directory where authentication is required either, so your password
is not being sent in the http requests for the buttons.  So why in the world
would we want to encrypt those requests?  There's nothing secret about
backtalk buttons.  Encrypting them just adds extra overhead on Grex and on
your browser.  So I can't think of any sensible reason to encrypt button
requests except to make your silly browser happy.  (By the way, what silly
browser is that anyway?)  I should probably do it to make silly browser's
happy.  Sigh.
mooncat
response 103 of 219: Mark Unseen   Jan 5 15:39 UTC 2005

It's happened to me a couple times, I'm using Internet Exploder... er, 
Explorer. ;) Not my fault, it's the only thing work offers and 
downloads are not allowed.
twenex
response 104 of 219: Mark Unseen   Jan 5 15:43 UTC 2005

I prefer the term "Exploiter", though the way things are going we might get
a bit less exploitation soon.
blaise
response 105 of 219: Mark Unseen   Jan 5 17:13 UTC 2005

Personally, I prefer "Insecure Explorer".
albaugh
response 106 of 219: Mark Unseen   Jan 5 17:50 UTC 2005

> the way things are going we might get a bit less exploitation soon

Something developing on the MS front?
twenex
response 107 of 219: Mark Unseen   Jan 5 17:55 UTC 2005

No, but Firefox is picking up momentum. A US university (for example) (was
it Princeton?) - just sent an email to all its staff and students urging them
to drop IE for Firefox, because IE is so insecure.
jep
response 108 of 219: Mark Unseen   Jan 5 18:21 UTC 2005

I was using IE from home.  Sorry to ask for a fix to such a stupid 
problem (and yes, it *is* a stupid problem).  Does Firefox handle it 
better?

I won't be using https as long as I have to keep clicking on pop-ups in 
order to use it.
twenex
response 109 of 219: Mark Unseen   Jan 5 18:25 UTC 2005

Firefox can block popups, but that might disable the secure login itself in
this case. The only other fix I can think of is to email the webmaster and
ask him politely to write better code!
blaise
response 110 of 219: Mark Unseen   Jan 5 18:32 UTC 2005

That's not a popup in the usual sense of the word; it's a browser dialog
window.  IIRC, Firefox does not complain about mixed secure and insecure
items on a page; if I am wrong then it has a "never complain about this"
checkbox on the dialog.
twenex
response 111 of 219: Mark Unseen   Jan 5 18:33 UTC 2005

Oh, those. duh. Jim's solution sounds like a winner, though.
tod
response 112 of 219: Mark Unseen   Jan 5 18:50 UTC 2005

ANy of you ever delete the certificate authority roots out of your browsers
and start from scratch?  
gull
response 113 of 219: Mark Unseen   Jan 5 19:53 UTC 2005

Nope.  Why, you don't trust Versign? ;)
cross
response 114 of 219: Mark Unseen   Jan 5 20:36 UTC 2005

This response has been erased.

other
response 115 of 219: Mark Unseen   Jan 5 20:43 UTC 2005

MSIE has pretty configurable security settings.  I'd try looking for
ones that might be applicable here. Depending on how much you rely on
your brain and how much on your browser for secure surfing (you're far
better off with the latter), you might just want to switch the
applicable setting off.
jep
response 116 of 219: Mark Unseen   Jan 5 21:14 UTC 2005

re resp:115: that possibility had not occurred to me.  I did this:

Tools > Internet Options > Security > Internet > Custom Level
Under "Miscellaneous" there is a setting "Display Mixed Content" which 
is set by default to "Prompt"
I set it to "Enable" and that removed the problem.

Thanks!
nharmon
response 117 of 219: Mark Unseen   Jan 5 21:14 UTC 2005

Re #114
Is a cert from a company really necessary? And the cheapest I've found from
a source I trust (which is either verisign, geotrust, or thawte) is $149/year
(thawte.com).

IMHO, Grex's own certs are plenty fine for what it uses them for.
gull
response 118 of 219: Mark Unseen   Jan 5 21:24 UTC 2005

I agree.  I told Firefox to accept Grex's certificate permanently, so I
wouldn't be nagged about it every time.  I don't see what benefit a
trust path to an entity that's trusted by default (which is what you're
paying for) would have, here.
petercon
response 119 of 219: Mark Unseen   Jan 6 15:38 UTC 2005

This response has been erased.

petercon
response 120 of 219: Mark Unseen   Jan 6 15:41 UTC 2005

Some people may have more problems in their scripts now that we've 
moved away from a SysV UNIX to a BSD UNIX - the "usr/ucb" directory in 
a SunOS sytem is where BSD UNIX commands were put in Suns SysV OS.  
Something like the move from Korn shell scripts to bash.  Shell scripts 
using Sun's SysV commands may not work the same in BSD (or be missing 
entirely) so be aware.  

Also, there are more differences in the directory structure and the 
whole environment and deamon setup that may affect scripts written in a 
SysV system.  Better test your scripts before trusting them.

twenex
response 121 of 219: Mark Unseen   Jan 6 15:41 UTC 2005

Ksh is now under an open source license. Failing that, pdksh might be
available, but it's a klone of ksh88, not 93.
twenex
response 122 of 219: Mark Unseen   Jan 6 15:41 UTC 2005

Er, clone.
mfp
response 123 of 219: Mark Unseen   Jan 6 15:56 UTC 2005

http://www.clonesforjesus.org/
 0-24   25-49   50-74   74-98   99-123   124-148   149-173   174-198   199-219 
Response Not Possible: You are Not Logged In
 

- Backtalk version 1.3.30 - Copyright 1996-2006, Jan Wolter and Steve Weiss