Why is it an error to have both X-Content-Security-Policy and X-Content-Security-Policy-Report-Only ?
If both a X-Content-Security-Policy-Report-Only header and a
X-Content-Security-Policy header are present in the same response, a warning
is posted to the user agent's error console and any policy specified in
X-Content-Security-Policy-Report-Only is ignored. The policy specified in
X-Content-Security-Policy headers is enforced.
Why is this? This seems like an unnecessary burden which prevents groups
from tightening their security policies over time.
For example, here at Google, I'm interested in helping resol...Turbopower Async Pro is blocked by Policy Local Cmpuer Policy\Windws Settings\Security Settings\Local Policies\User Right Assignment
If computers have set "Load and unload device drivers" in this key to
Asministrators only, my program will not be able to connect an external
device if I use tApdDataPacket for communication, but if I use
tApdTerminal, everything works ok.
Has anyone any idea what device drivers may be involved here when adding
Users to the group, the program work properly ?
Must be something that is loaded by the packet component? Is this driver
something that could be preinstalled by installation program ?
Onthe other hand, is it normal to do this restriction in policy?
(the c...when is secure, secure?
I wrote a custom authentication handler for PureFTPD, using a combination of
authentication methods, for about 4 different types of users.
So far, from testing it, it does look to work properly, and does it's job
pretty well (and fast). I use #!/usr/bin/perl -W as well as use Strict, and
use warnings, and the code returns no errors or warnings when run.
I am right to presume that this basically only really tells me the my syntax
and structure of the application is right? What's a good way to see whether
it is actually SECURE... There is a couple of lines of...Security policies
Is there a way to limit what users can and can't do with their email. We
want to take away the rights to delete e-mail, so we can audit certain
employees, who are abusing groupwise.
There has to be a way! If not I will cry.
Not really. Start crying
GW 7 (with 3rd party software) will let you audit them at least.
Michael J. Bell
Novell Support Connection Volunteer Sysop
Author of Guinevere (http://www.openhandhome.com)
PLEASE: Do not e-mail me privately unless specifically asked.
I'm a volunteer, not a Novell employee!
All opinions and advice provided are ...security policy
We have zenworks 4.0.1 we are trying to push down a group policy with
Everything is pushed down to the workstation except the security settings...
Is this a known problem or are we doing something wrong?
If the last how should we push these settings?
> We have zenworks 4.0.1 we are trying to push down a group policy with
> security settings.
> Everything is pushed down to the workstation except the security
There have been a few issue, but most or all have been resolved with the
later patches like Ir4 or ...Security Administrator
I am having a problem connecting to the Component Manager from the Security
Administrator. I know the Component Manager is up because I can connect to it
from a Workspace.
I am a little confused-I enter in the Database Server Name and the Database
Name(pscmpmgr) in the logon dialog. I am then brought to an ODBC setup. This is
not what the documentation says is supposed to happen.
Thanks if anyone is able to help.
Content-Type: text/plain; charset=us-ascii
Does anybody has a documentation or where I can find how to configure
the DCE or any information regarding how to configure ASE for that
I want to put implement a Network Bases Security
Im running HP-UX 11
I type dcecp
but I don't know how to create the key file
Thanks for your time
AD ASTRA PER ASPERA
"Think in the incredible and take a chance of the impossible"
-----------...History is not history
Name: Dr J R Stockton
Summary: History is not history
Firefox 3.6.8 (others presumed likewise) has a menu item History". But
that does not show a history; rather, it seems to give a Most Recently
(1) If it is an MRU list, it should be named correspondingly.
(2) A true History, with dates and times, would be much more useful -
especially combined with a kill list for sites visited too frequently.
Browser Details: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/533.4 (KHTML, like Gecko) Chrome/5.0.375.126 Safari/533...History security
Is there a way to password-protect browsing history?
> Is there a way to password-protect browsing history?
Browsing History is a part of Firefox profile.
Set a master password to protect your profile:
Goto Tools>Options>Privacy>Password>Set Master Password
or use this extension "ProfilePassword 0.3.1" :
> Alec wrote:
>> Is there a way to password-protect browsing history?
> Browsing History is a part of Firefox profile.
I want to simplify the mechanism to set up security. The scanner is ok and
the admin is ok only for the porpouse of setting users and groups.
My idea is to use the aplication being secured for seting security. How? I
dont know yet, but the basis are to trap some events. For example, the app
is running and the user responsible for set security would rightclick in one
menu item, then a popup would show indicating which users/groups are
permited to access this menuitem.
My problem to do this is to trap de rightclick in objects (menu items,
buttons, dw, etc) before the event goes to the ob...security too secure
Summary: security too secure
The security thing won't let me in this sight no matter how I accept,
confirm, get certificate, etc.
Browser Details: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.4; en-GB; rv:1.9.1b4) Gecko/20090423 Firefox/3.5b4
From URL: http://hendrix.mozilla.org/
Note to readers: Hendrix gives no expectation of a response to this feedback
but if you wish to provide one you must BCC (not CC) the sender for them to
...ASE and ASE
Could it be possible to take scripts from ASA and load them in an ASE
Any information is welcome
ASA supports a fairly large sub-set of Transact-SQL, so if you write your
stored procedures and triggers in ASA using T-SQL, you should be able to
create scripts that will run against both ASE and ASA. If you're planning
to do this though, I would suggest developing your database schema against
ASA, since everything you write in T-SQL in ASA will be supported on ASE,
but the reverse is not true.
Check out the section in the ASA documentation entitled "Tra...ASE to ASE
Is anyone out there doing ASE to ASE replication using SQL remote? If
you are have created your own version of the SSEXTRACT utility to set up
a replicant database in ASE rather than ASA? Or does anyone know if
SYBASE has created a version SSEXTRACT for use with ASE to ASE
Thanks in advance
I thought the SQL Remote Replication support in ASE11.5 was meant for a
consolidate-database only (by design)! At least that was what Sybase
said when they announced support for SQL Remote technology support in
I will be happy to...How secure is secure?
Thanks to this group and all the high tech individuals who frequent it I
have learned how to protect my PC from the inside out. But what about
security risks to my info 'before' it gets to my computer? Like my mail
box on the server. Could someone hack into that and thumb through my
If so, how would I ever know?
(The short story)
We have a rogue employee at my work who one day decided to run the web
site, she got in tight with the ISP, got tools to set and delete
passwords on a protected directory on the server. Who knows if she has
telnet access to other things, li...ASE security
Has anyone successfully granted admin(sa,sso) roles to users? I have
gotten the following:
1> grant role sa_role to bob
Msg 156, Level 15, State 1:
Incorrect syntax near the keyword 'role'.
this is while logged in as sa.
Also I have read about the Sybase Central utility. does this come with
the Linux version? If so where is it installed? If not is it available
I recieved an email from Ryan Lubke with the commands that work.
sp_role "grant", "sa_role", user_name
exec sp_role "grant", "sso_role",...