I think it actually is working the way I had expected. The source of my confusion was two things:
1. When previously cached fresh items are displayed, firebug displays the headers from the...
Type: Posts; User: cdenley; Keyword(s):
I think it actually is working the way I had expected. The source of my confusion was two things:
1. When previously cached fresh items are displayed, firebug displays the headers from the...
I know how it works on the server side. I can see the headers apache puts in the responses. What I can't figure out is how browsers decide when to revalidate.
I'm using both since I'm using mod_expires.
I think I figured out the answer to my own question. The server gives a "Last-Modified" header in all responses for static content. For dynamic content, there is no "Last-Modified" header. This value...
I did read that. In fact I linked to it in my first post. The reason why I'm posting here is because what I observe doesn't seem to match my understanding of the RFC. If the expiration hasn't been...
I had considered always renaming a file whenever it is changed, but then you have to make sure you fix all references to the file. If myimage.jpg appears on 20 different pages and I want to make a...
How does caching work exactly? I just started reconfiguring apache's mod_expires settings, but I want to completely understand how this will effect the users. I've been trying to read the HTTP/1.1...
AFAIK, you can only install windows by booting to its installation CD. If it does have an upgrade installer, it's not going to run in Linux, even if you use wine. You have to boot to the windows...
They are "disabled" in the sense that there is nothing significant listening on any ports so your system wouldn't accept any connections. Why filter connections no applications are going to accept...
By "root/downloads/neroAacEnc" do you mean the absolute path "/root/downloads/neroAacEnc". Are you sure the "downloads" directory isn't "Downloads"? Why is it saved in root's home directory? You...
Tor isn't an HTTP proxy. Port 8118, is that privoxy? Your local HTTP proxy is what is removing the HTTP referrer, not tor. You can simply not use your HTTP proxy, and use only tor. I believe you just...
Firefox is used on both. Many firefox vulnerabilities can be exploited on either OS. The biggest concern is probably the non-free adobe flash plugin, though. The browser (with plugins) is probably...
Is this a desktop installation? How is networking configured?
cat /etc/network/interfaces
I believe both mp4 and flv video files residing on the local filesystem play with the totem media player by default. Either format can potentially exploit a vulnerability in the gstreamer decoder,...
+1 for wireshark, but this command would show you all network connections (what process is connecting where on what port).
sudo netstat -tnp
That IS the IP you are using, then. However, the question is whether that IP is used exclusively by your router. If so, then all you need is to configure your router to forward unsolicited traffic it...
Also, you shouldn't have edited apache2.conf. That line should already be in ports.conf, and shouldn't appear twice in your configuration files. And it is best to allow the a2ensite, a2dissite,...
Why are you using getdeb? It is in the ubuntu repos.
I'm guessing you're trying to install an old version which no longer exists in getdeb's repos because your package index is outdated.
sudo...
You should not set a root password. It is safer to have no valid root password, which is the default. Recovery mode should work without requiring a password when no root password is set. I think you...
This command is a little more informative, for future reference.
sudo netstat -tnp
Authentication attempts such as that are very common. Bots will check random IP's to see if it is hosting a SSH server, and if they are, it will attempt to authenticate using weak passwords and...
Yes, but I think the concern was for privilege escalation in general, not specifically for browser exploits. I'm guessing a javascript browser exploit was only an example.
Technically, if your browser is compromised in a way that allows the attacker to execute arbitrary code, they could wait for you to use sudo, kill your terminal session, re-use your tty, then use...
As I already said, if the client gives "Permission denied", then it must be connecting to a SSH server. Considering that he is connecting to some SSH server, and he can access the web server using...
5.2.4-2ubuntu5.10 > 5.2.4
Fixes made in more recent releases get backported to the stable version (5.2.4) in the repos.
zcat /usr/share/doc/php5-common/changelog.Debian.gz|less
What are...