(no subject)

Date: 2007-07-31 08:22 pm (UTC)
From: [identity profile] kheldan.livejournal.com
They missed one: "Use SSH"

(no subject)

Date: 2007-07-31 08:26 pm (UTC)
From: [identity profile] anivair.livejournal.com
that'll get you around a lot, but they couldn't include it in the list because it's more or less safe and unlikely to make your machine explode with spyware.

(no subject)

Date: 2007-07-31 10:31 pm (UTC)
From: [identity profile] mhoye.livejournal.com
If you think that will help you, you're wrong.

(no subject)

Date: 2007-07-31 10:49 pm (UTC)
From: [identity profile] theweaselking.livejournal.com
I can see how "SSH to a system where you *do* have rights to install software, use that software, on that system, remotely" could be a perfectly acceptable solution in some cases. It depends what kind of policy you're trying to work around.

(no subject)

Date: 2007-08-01 10:00 pm (UTC)
From: [identity profile] kheldan.livejournal.com
Really? How so?

(no subject)

Date: 2007-07-31 10:46 pm (UTC)
From: [identity profile] theweaselking.livejournal.com
No, know, they didn't miss it. See their suggestion to just add an S to your URLs and that will fix everything? That's *like* SSH, right?

(no subject)

Date: 2007-08-01 12:25 am (UTC)
From: [identity profile] mhoye.livejournal.com
I found their "look for a 'secure' icon" advice particularly fine.

(no subject)

Date: 2007-08-01 12:39 am (UTC)
From: [identity profile] ben-raccoon.livejournal.com
Ah, but that's a legitimately secure method and as such, not allowed on this list.

Profile

theweaselking: (Default)theweaselking
Page generated Feb. 5th, 2026 05:52 pm