Welcome to LWN.net [LWN.net]https://lwn.net/
(14 posted) Remote authentication bypass in telnetd [Security] Posted Jan 20, 2026 20:45 UTC (Tue) by corbet One would assume that most LWN readers stopped running network-accessi
Cryptography Amicus Brief 10/96https://archive.epic.org/crypto/export_controls/amicus_brief.html
means of encryption and authentication-- features that can only be provided if cryptographic know-how iswidely available and unencumbered by government regulation. Although the te
Making an OS that Doesn't Suckhttp://www.uruk.org/opinions/os.html
API/"User-Level Model" Authentication and Security Distributed/Cluster Capabilities All resources should be network-transparent. Don't use a single centralized/global controller f
Linkshttps://triptico.com/links/
that is the Pluggable Authentication Module (PAM): https://linderud.dev/blog/pam-bypass-when-nullis-notok/ How to get root on Ubuntu 20.04 by pretending nobody’s /home » https://s
Roger Clarke's Cookies Pagehttp://www.rogerclarke.com/II/Cookies.html
2616 (HTTP 1.1), 2617 (Authentication), 2817 (HTTP over TLS), 2935 (OTP), and now 2964 (Use of State Management) and 2965 (State Management) - and, if they're still alive, maybe a
SSH Configuration | The Voidcruiserhttps://voidcruiser.nl/rambles/ssh/
Configuration Password Authentication Adding keys to authorized_keys Changing the port Client configuration The ~/.ssh/config file AddKeysToAgent IdentitiesOnly ProxyCommand The S
An article on configuring SSH from the ground up to something that can grow out into something like my monster of a config file
Internet Kermit Servicehttps://www.kermitproject.org/uiksd.html
Automatic Settings 5.2. Authentication 5.3. The DISABLE Command 5.4. Shell Access 5.5. Anonymous Users 5.6. Management Information 6. Open Issues 6.1. Connection Establishment 6.2
Building software for yourself with Linus Lee (Changelog Interviews #455)https://changelog.com/podcast/455
things, how you do authentication, things like that. You can kind of duct-tape things together nicely… But duct-tape things together, as opposed to having a perfect solution, and
Today we're talking to Linus Lee about the practice of building software for yourself. Linus has several side projects we could talk about, but today's show is focused on L
NLnet; 55 New Projects Awarded NGI0 Grantshttps://nlnet.nl/news/2023/20231123-announcing-projects.html
will add two factor authentication, improve interoperability, scalability and add some new features like better archiving capabilities. ▸ For more details see : https://nlnet.nl/p
Mavericks Foreverhttp://mavericksforever.com/
SSL: (disable/uncheck) Authentication: Password Under Outgoing Mail Server Info , enter: Page 1: SMTP Server: localhost User Name: (your @icloud.com email) @smtp.mail.me.com Examp
Market Ticker Frequently Asked Questionshttp://tickerforum.org/faq.html
a key to your user authentication. This code will remain valid for up to one year, unless you explicitly click "Logout" or clear the cookies on your browser. If you use https to a
Tickerforum Frequently Asked Questions
Introducing the REBOL Internet Operating System: IOShttp://www.rebol.com/ios/ios-intro.html
certificates, and authentication. Integrates quickly with legacy systems and existing databases. Administrative functions can be script operated. WIP Wiki 3.3.0 ▣ ▤ &n
Find more...