I run an instance of Sandstorm, which is software you can install on a Linux server that lets you run other apps. Some features:
* One-click installs of any of 47 apps, like WeKan (similar to Trello) and Davros (similar to Dropbox) and Etherpad (which you probably already know about) and Piwik (similar to Google Analytics).
* Total self-hostability, with auto-configured free HTTPS certificates and dynamic DNS if you want.
* Security sandboxing of the apps against each other and away from the Internet, so malicious apps can't leak your data back to the app's author.
* A way to "share" an instance of any app, like on Google Docs.
* Total open source-ness.
Admittedly, I'm one of its authors too. So feel free to take this with a grain of salt. But I do use it every single day.
Also if your friends don't want to self-host, but want to use the same apps as you, the Sandstorm.io company runs a hosting service.
Hi anonymous person,
Getting more eyeballs on your code is a marketing problem. So:
* Give us here a link to your code, and
* Make it easy to run your code.
* Then, you can try to reach people who care about that problem domain and tell them to use your code.
To make it easy to run the app, I suggest you create a package for Sandstorm, which is an open source project that makes web apps easy & secure to run. I work on the project, so feel free to decide I'm biased! But do take a look at https://apps.sandstorm.io/ and see how easy it is.
You can reach me (for packaging help) at firstname.lastname@example.org and find our packaging tutorial here: https://docs.sandstorm.io/en/l...
Best of luck!
Sandstorm is a security product, so we want to address that head-on.
When you install software on Linux, no matter what package manager you use, you are giving that software permission to act as you. Most package managers will even execute scripts from the package at install time – as root. So in reality, although curl|bash looks scary, it’s really just laying bare the reality that applies to every popular package manager out there: anything you install can pwn you.
Realistically, downloading and installing software while relying on HTTPS for integrity is a widely-used practice. The web sites for Firefox, Rust, Google Chrome, and many others offer an HTTPS download as the primary installation mechanism.
Only problem having the source code does not mean you can actually understand it. A lot of open source code is obfuscated, sometimes I'm wondering if its deliberate
The GPL handles this by requesting the "preferred form for modification." Consider reading the GPL sometime; it's a really well-written document that considers a lot of these issues.
YouTube has a standard DMCA complaints procedure. I recommend that Yoon Mi-rae and the label follow that process, partly because it actually works which is great in this case, and partly to give Sony a taste of their own medicine.
Here is the link: https://support.google.com/you...
(Note that I have a bunch of experience with the take-down process, including participating in an EFF lawsuit ~10 years ago; see https://www.eff.org/document/d...
The Slashdot summary is confusing, as is the eweek.com headline. Reading the article, it is clear that it is about the code that powers the official Python interpreter, AKA CPython, AKA
It'd be great if the headline in Slashdot were to be fixed to say, "Python interpreter has fewer code defects compared to other open source C programs, says Coverity."
> 165 million years ago
Can't tell if typo or actually meta-trolling about science.
The laptop was mis-priced due to a bug in Dell's system, one of the engineers on the project tells me. It's now $1449 , as you can see at http://www.dell.com/us/soho/p/xps-13-linux/pd .
Can the title here please be fixed?
Are we running light with overbyte?