On 05/17/2011 09:39 PM, Bob Sneidar wrote:
True enough. But the redirect and proxy issues are more complex. Proxies for
instance are commonly encrypted, which means by the time it gets to the
firewall, it's garbldygook. You can't do deep packet inspection on an encrypted
stream. So I think say
True enough. But the redirect and proxy issues are more complex. Proxies for
instance are commonly encrypted, which means by the time it gets to the
firewall, it's garbldygook. You can't do deep packet inspection on an encrypted
stream. So I think saying that firewalls are not good enough is a b
On 05/17/2011 09:20 PM, Bob Sneidar wrote:
Well it's kind of like web proxies. Many use them as a way to firewall off their site, or
do load balancing with multiple servers. But they are also used to bypass content filters
that are required by law in school environments. It's the old, "Fire, BA
Well it's kind of like web proxies. Many use them as a way to firewall off
their site, or do load balancing with multiple servers. But they are also used
to bypass content filters that are required by law in school environments. It's
the old, "Fire, BAD! No wait, fire GOOD!" conundrum. If you tr
Thanks for the clarification and the rationale. I dislike the
behavior of people who do ill just because they can.
On May 17, 2011, at 2:04 PM, Richmond Mathewson wrote:
On 05/17/2011 08:25 PM, Charles Phillips wrote:
Sicko
Frankly if this plays "merry hell" with browsers and firewall
s
On 05/17/2011 08:56 PM, Richard Gaskin wrote:
Bob Sneidar wrote:
> On May 17, 2011, at 2:34 AM, Matthias Rebbe wrote:
>
>>> This code is stored as a text file inside a data folder in
>>> the server, the first line of that folder is
>>> the long URL. When someone tries to access http://fon.nu/som
On 05/17/2011 08:25 PM, Charles Phillips wrote:
Sicko
Frankly if this plays "merry hell" with browsers and firewall software,
that tells you that the
browsers and firewall software aren't much good. All types of security
need to be continually
tested. If you are feeling "anti-Richmond" just d
Bob Sneidar wrote:
> On May 17, 2011, at 2:34 AM, Matthias Rebbe wrote:
>
>>> This code is stored as a text file inside a data folder in
>>> the server, the first line of that folder is
>>> the long URL. When someone tries to access http://fon.nu/something
>>> the irev file picks the something pa
Sicko
On May 17, 2011, at 12:50 PM, Richmond Mathewson wrote:
On 05/17/2011 07:22 PM, Bob Sneidar wrote:
So's you know, this will wreak havoc with a lot of browsers and
firewall software.
Bob
That's what makes it so appealing . . . :)
___
use-
On 05/17/2011 07:22 PM, Bob Sneidar wrote:
So's you know, this will wreak havoc with a lot of browsers and firewall
software.
Bob
That's what makes it so appealing . . . :)
___
use-livecode mailing list
use-livecode@lists.runrev.com
Please visit
So's you know, this will wreak havoc with a lot of browsers and firewall
software.
Bob
On May 17, 2011, at 2:34 AM, Matthias Rebbe wrote:
>> This code is stored as a text
>> file inside a data folder in the server, the first line of that folder is
>> the long URL. When someone tries to access
Andre,
thank you very much for sharing this! ! !
Matthias
Am 15.05.2011 um 22:58 schrieb Andre Garzia:
> Matthias,
>
> Fon.nu works fairly easy. When we want to shorten a URL, we compute an md5
> of the url then we convert it to base 23 so that is becomes something like
> A123FG and the short
Thanks for sharing the whole enchilada, Andre! I imagine a lot of people (like
myself) learn best by studying examples and tinkering with them to suit our needs.
Great job!
Phil
On 5/15/11 1:58 PM, Andre Garzia wrote:
Matthias,
Fon.nu works fairly easy. When we want to shorten a URL, we com
Matthias,
Fon.nu works fairly easy. When we want to shorten a URL, we compute an md5
of the url then we convert it to base 23 so that is becomes something like
A123FG and the short url is something like http://fon.nu/A123FG, so for a
given URL always generate the same small code. This code is stor
True, I could get very hurt if I ever decided to break away from gmail. I've
been quite dependent on their filtering. Their filters are really good.
When stuff is in the spam bucket, no images can show and the links are
mitigated. Few false negatives or false positives.
I used to use different ema
Hi Andre,
very very impressive. I have done something similar, but only for inhouse
use.
I created a desktop app, which creates for each "long url" a short url e.g
http://m-r-d.de/x where x is a number. For each new short url the number
increases.
I then create a folder (with the name of
Jim,
Want to learn a trick that will cut spam a lot. NEVER NEVER NEVER allow a
marketing email to load any image. Images are tagged with unique
identifiers, so if you allow them to load, they basically ping back the
server with a message: "Hey Master, do you know email id 2398562965 that
went to J
Way to go, Andre.
My feature request is a way of shortening spam to way less than 2
characters :-)
On May 14, 2011, at 8:53 PM, Andre Garzia wrote:
Hello Folks,
During RunRevLive.11, more precisely at 4:00 AM in the morning, I
created
fon.nu, a minimalist url shortening service. I create
Hello Folks,
During RunRevLive.11, more precisely at 4:00 AM in the morning, I created
fon.nu, a minimalist url shortening service. I created that because at 9:00
AM on the same day, I was going to give a presentation on social networks
and wanted the URLs on my slides to be short. So, fon.nu doma
19 matches
Mail list logo