This warning has appeared when logging in.
" This site is not secure. Logins entered here could be compromised."
Should I/we be concerned?
This warning has appeared when logging in.
" This site is not secure. Logins entered here could be compromised."
Should I/we be concerned?
There is a sticky thread about registration activation here: http://sci.rutgers.edu/forum/showthr...-registrations
Contact Jim (Administtrator): http://sci.rutgers.edu/forum/member.php?2029-Jim
All modern browsers have rolled out a warning that automatically displays on pages / sites that users enter data (login, cc, etc). It does not mean the site is compromised or anything nefarious. It simply alludes to the point the site does not have /use SSL. (HTTP vs HTTPS).
I have met with Rutgers IT, if the site was not secure, they would not allow us to remain on their server.
Thank you for your replies and reassurance.
Chrome doesn't offer a warning, Mozilla does.
I even get it on some site that have the HTTPS. Sometimes I have to close it cause it won't me continue. Click it start over same thing. After a few times it works. Frontier sucks anyway
Art
PHP secure!? Healthcare use Microsoft so must be sampling drugs or drinking water with lead in it.
I pulled PHP and any thing that depends on it off my systems. This was after I discovered all sorts of escape artistry.
I use C, POSIX Shell, ksh, awk, Perl. Shell should use wordexp(3) only once to expand. I don?t use GNU Bash in scripts, I use Debian Dash.
I can break bad C programs with Control-@. My ones are binary safe or expect it.
To me secure is only true or false. Only correct systems can be secure. Scanning and firing walls can not make an insecure system secure.
Frontier is so bad here its more the connection then anything else. I can disconnect then connect again then it works or the sever is to busy. Frontier just sucks around here is all. 1.2 mg is all I can get here. Better than dialup sorta.....lol
Art
Beware those bad connections can compromise TLS!
I OpenVPN via TCP (proto tcp) with compression (comp-lzo) over the weak link. That way the TLS is inside the OpenVPN. I use this with worst effort hotel and cafe WiFi. I trombone off my machine at home on cable. Always use OpenVPN has the gateway (push "redirect-gateway") and allow for NAT (float).
- /etc/openvpn/server.confCode:proto tcp comp-lzo push "redirect-gateway"
- In clients for NAT traversal.Code:float