uncleflo

profile picture

Some cool dude. Higher order of decision making. Absolute.

Registered since September 28th, 2017

Has a total of 4281 bookmarks.

Showing top Tags within 14 bookmarks

howto   information   development   guide   reference   administration   design   website   software   solution   online   service   product   business   uk   tool   company   linux   code   server   application   system   web   list   video   marine   create   data   experience   tutorial   description   explanation   learn   technology   build   article   blog   world   project   boat   download   windows   lookup   security   free   performance   javascript   technical   london   beautiful   control   network   tools   support   course   file   research   purchase   image   library   programming   youtube   example   php   construction   install   opensource   community   html   quality   computer   feature   profile   power   browser   music   platform   process   mobile   work   user   share   manage   professional   database   hardware   buy   industry   advice   internet   dance   developer   installation   3d   search   camera   access   customer   travel   material   standard   money   test   develop   review   documentation   css   engineering   photography   webdesign   engine   device   digital   speed   event   api   source   management   program   question   client   phone   discussion   content   simple   story   water   marketing   yacht   app   account   setup   interface   package   idea   fast   communication   compare   cheap   script   market   study   easy   live   google   resource   operation   demonstration   contact   startup  


Tag selected: allow.

Clear all

Showing 14 results.

Looking up allow tag. Showing 14 results. Clear

Get an Anonymous Phone Number to Keep Your Identity Safe From Unwanted Calls | Hushed - Secure second and temporary phone number app

https://hushed.com/get-an-anonymous-phone-number-to-keep-your-identity-safe-from-unwanted-calls/

Saved by uncleflo on February 12th, 2022.

Have you ever wondered why you’re getting calls from random 1-800 telemarketers that you’ve never heard of? Or better yet, a text pops up asking you to click on a sketchy weblink? Obviously, you never asked for these companies to contact you. So, how does this happen? The reality is, every time you include your real phone number on a form, whether it’s at a local fair to win a trip to Hawaii, or on a social media profile, the companies receiving your information may well be farming out this information to other companies that, in turn, want to market products to you. Even if you’ve asked this first company NOT to share your info with other companies, someone who’s uninterested in your consent could still have gathered up your number through sketchy means. Now once your real number is out, consider that it could be placed on more call lists that these companies might sell to other companies that could well go on to sell them to even more companies. Based on this, you can begin to get a sense of how one small, innocuous form you filled out has now translated into texts from a Romanian area code – whose message insists you click a weblink to find out the link brings you to “someone who likes you”.

victimize unsolicited uninterested anonymous erase phone unlimited consume unwanted scream ignore plug call plenty obvious privacy abundant easy answer protect consent personal trip sell service data information company text message allow permission usage discussion identity


Van Hire & Van Rental at Yellohire

https://www.yellohire.com/

Saved by uncleflo on January 17th, 2022.

At Yellohire we can arrange to supply you with various different models from a SWB Transit van and a Luton 3.5t to a Vauxhall Zafira and a Volkswagen Golf. We can meet all of your travel needs whether for commercial or personal use. Our vehicles are ideal for trips to the airport and delivery or relocation projects. We also offer a one way service for when you're not planning a return trip. Bookings request made in normal working hours are usually confirmed within a hour. One Way booking requests require agreement between the management of both branches. Most bookings requests will be confirmed within 24 hours but One Ways can take longer. Drivers under 25 years of age have to pay an additional charge for their insurance. They must have held their full driving Licence for 24 months and have no Convictions/Bans or Points.If this causes any problems call us on 0800-023 5397. In most of the locations drivers under the age 22 years of age not allowed to drive hired vehicle.

mileage hire booking convenient relax vehicle remember rental guarantee deposit customer manage conviction problem location commercial personal driver allow car insurance local kent uk van


UTF-8 Sampler

http://kermitproject.org/utf8.html

Saved by uncleflo on June 23rd, 2019.

UTF-8 is an ASCII-preserving encoding method for Unicode (ISO 10646), the Universal Character Set (UCS). The UCS encodes most of the world's writing systems in a single character set, allowing you to mix languages and scripts within a document without needing any tricks for switching character sets. This web page is encoded directly in UTF-8. This, however, is a Web page, which started out as a kind of stress test for UTF-8 support in Web browsers, which was spotty when this page was first created in the 1990s but which has become standard in all modern browsers. The problem now is mainly the fonts and the browser's (or font's) support for the nonzero Unicode planes (as in, e.g., the Braille
and Gothic examples below). And to some extent the rendition of combining sequences, right-to-left rendition (Arabic,
Hebrew), and so on. The subtitle above shows currency symbols of many lands. If they don't appear as blobs, we're off to a good start!

sample test utf8 unicode character category example document reference language sentence method encode universal system allow webpage sequence combine rendition font browser support extent currency preserve development administration


How to access files on Synology NAS within the local network (NFS)

https://www.synology.com/en-uk/knowledgebase/DSM/tutorial/File_Sharing/How_to_access_files_on_Synology_NAS_within_the_local_network_NFS

Saved by uncleflo on December 23rd, 2018.

Synology NAS is designed to make storing and sharing files within your local network quick and simple, allowing you to directly access shared folders and files on the Synology NAS without going through the hassle of logging into DSM everytime. You will be able to access files on your Synology NAS with NFS just like other network devices. This article guides you through the steps of using your Linux computer to access your Synology NAS within the local network.

improve synology server nas local network linux computer store share allow folder file dsm access files nfs howto article guide step-by-step filesystem device tutorial administrator home windows knowlede manager management software system


How to manually install the Securly SSL certificate in Chrome

https://support.securly.com/hc/en-us/articles/206081828-How-to-manually-install-the-Securly-SSL-certificate-in-Chrome

Saved by uncleflo on May 30th, 2018.

You would want to install the Securly SSL certificate in your Chrome browser to ensure the best browsing experience. The certificate does not control the level of filtering or what sites are allowed. The certificate will prevent errors on sites that Securly decrypts. Without the certificate, sites like Google.com and Facebook.com will show privacy errors, users will perceive this as the internet being “broken”. To install the Securly SSL certificate manually in Chrome, open ‘chrome://settings’ in your Chrome browser (version 59.0.3071 and above)

install security ssl certificate error localhost howto setup chrome google settings development administrator browser site root administer allow secure article description experience privacy


Page

http://smalljs.org/client-side-routing/page/

Saved by uncleflo on December 7th, 2014.

Page is a small client-side routing library for use with building single page applications (SPAs). It has a simple API which is inspired by Express. It utilizes the HTML5 history API under the hood, which is what allows you to build smooth user interfaces while still having linkable URLs for different pages of the app.

javascript router page library framework small minimal routing spa script allow api express history client side application html smooth single development client side url interface link manage user


Image Recognition API for mobile and web developers - Create your own app that uses visual search

https://www.recognize.im/

Saved by uncleflo on February 8th, 2014.

Recognize.im allows businesses to quickly build image recognition into their own mobile and web applications. The setup is quick: upload or import your graphics to Recognize.im, and copy the ready-made code generated from the site. In a few minutes, your platform will have built-in image recognition technology. This type of solution promotes real customer engagement and sales through the mobile channel in virtually any consumer-facing industry. Recognize.im is an image recognition API platform created by iTraff Technology, based both in the U.S. and Europe. Established in 2010, the company has been developing image recognition technology for over 2 years, and are now empowering mobile and web developers to utilize the technology with recognize.im.

recognize allow business build application setup upload import graphics library api service startup engage platform search visual development


Gentoo Linux Documentation -- Modifying the Gentoo Hardened SELinux Policy

http://www.gentoo.org/proj/en/hardened/selinux/selinux-handbook.xml?part=2&chap=5

Saved by uncleflo on August 30th, 2013.

By default, Gentoo provides a generic, yet tightly controlled policy which is deemed a good start policy for the majority of users. However, the purpose behind a Mandatory Access Control system is to put the security administrator in control. As such, a handbook on SELinux without information on how to write policies wouldn't be complete. In this chapter, we'll talk a bit about the language behind SELinux policies and give some pointers on how to create your own policies, roles, etc.

gentoo linux selinux guide information howto system modify change policy book language interpretation module role user allow


None

http://danwalsh.livejournal.com/63137.html

Saved by uncleflo on July 23rd, 2013.

Every process has a label every object on the system has a label. Files, Directories, network ports. The SELinux policy controls how process labels interact with other labels on the system. The kernel enforces the policy rules.

selinux control allow file description paper policy permission linux management network administration


None

http://wiki.centos.org/HowTos/SELinux

Saved by uncleflo on July 23rd, 2013.

Security-Enhanced Linux (SELinux) is a mandatory access control (MAC) security mechanism implemented in the kernel. SELinux was first introduced in CentOS 4 and significantly enhanced in CentOS 5 and 6. These enhancements mean that content varies as to how to approach SELinux over time to solve problems.

guide selinux allow description centos label security linux solution howto administration


None

http://docs.fedoraproject.org/en-US/Fedora/13/html/Managing_Confined_Services/chap-Managing_Confined_Services-The_Apache_HTTP_Server.html

Saved by uncleflo on July 23rd, 2013.

"The Apache HTTP Server Project is an effort to develop and maintain an open-source HTTP server for modern operating systems including UNIX and Windows NT. The goal of this project is to provide a secure, efficient and extensible server that provides HTTP services in sync with the current HTTP standards". In Fedora, the httpd package provides the Apache HTTP Server. Run rpm -q httpd to see if the httpd package is installed. If it is not installed and you want to use the Apache HTTP Server, run the following command as the root user to install it.

install port guide allow development secure apache permission web linux howto selinux open httpd source http description server management


None

http://unix.stackexchange.com/questions/50639/httpd-cant-write-to-folder-file-because-of-selinux

Saved by uncleflo on July 22nd, 2013.

Does anyone know which sebool it is to allow httpd write access to /home/user/html? When I disable selinux echo 0 > /selinux/enforce I can write, so definitely selinux. Just don't know which one is the right one without opening a big hole and Google isn't being much help.

information allow root secure apache permission manage linux enhanced access solution selinux folder httpd file bool public


Topic: Open Firewall Ports

http://www.collectionsmax.com/help/installationguide/open_firewall_ports_print.htm

Saved by uncleflo on May 20th, 2013.

You will need to open port 3306 TCP in the Windows firewall or any third party firewall for all software so it can communicate with MySQL. The server should have port 3306 TCP open both inbound and outbound (if using Windows 7 or higher)
On the server you should open port 3306 TCP .......on the workstations you should allow the applications through the firewall.
Since Windows has different versions and ways to open the firewall we have included some of the most popular methods.

mysql port firewall enable topic tcp udp server inbound outbound windows advanced allow connection method computer add


Microsoft Network Monitor 3.4 - Microsoft Download Center - Download Details

http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=4865

Saved by uncleflo on March 22nd, 2012.

Network Monitor 3.4 is a protocol analyzer. It allows you to capture network traffic, view and analyze it. Version 3.4 is an update and replaces Network Monitor 3.3. Network Monitor 3.x is a complete overhaul of the previous Network Monitor 2.x version. Supported operating systems: Windows 7, Windows Server 2003 Service Pack 2, Windows Server 2003 Service Pack 2 x64 Edition, Windows Server 2008, Windows Server 2008 R2, Windows Server 2008 R2 for Itanium-based Systems, Windows Vista 64-bit Editions Service Pack 1, Windows Vista Service Pack 1, Windows XP 64-bit, Windows XP Service Pack 3

network monitor download center details requirements microsoft protocol analysis capture allow traffic internet


No further bookmarks found.