Thursday, December 7, 2017

GITHUB and GITHUB pages : Use any theme with GitHub Pages

"Just over a year ago Jekyll, the open source project that powers GitHub Pages, introduced shared themes. Since then, you've been able to use about a dozen themes to change the look and feel of your GitHub Pages site.
Starting today, you can use any of the hundreds of community-curated themes on To build your site with any public, GitHub-hosted theme, add the following to your site's _config.yml file:
remote_theme: owner/nameReplacing owner and name with the repository's owner and name.
And if you're interested in making your Jekyll theme available to other users, simply follow the instructions for creating a Gem-based theme, and ensure the repository is public.
For more information, see the Jekyll theme documentation or get in touch." a post from

Some exemples of  GitHub Pages. automatically generated from OSLM projets on github.

Tuesday, December 5, 2017

Setting up Samba as an Active Directory Domain Controller

Starting from version 4.0, Samba is able to run as an Active Directory (AD) domain controller (DC). If you are installing Samba in a production environment, it is recommended to run two or more DCs for failover reasons.
This documentation describes how to set up Samba as the first DC to build a new AD forest. Additionally, use this documentation if you are migrating a Samba NT4 domain to Samba AD. To join Samba as an additional DC to an existing AD forest, see Joining a Samba DC to an Existing Active Directory.
Samba as an AD DC only supports:
Samba uses the MIT KDC provided by your operating system if you run Samba 4.7 or later and has been built using the --with-system-mitkrb5 option. In other cases Samba uses the Heimdal KDC included in Samba. For further details about Samba using the MIT KDC, see Running a Samba AD DC with MIT Kerberos KDC.

Kerberos config on ubuntu (en)

Kerberos is an authentication protocol using a combination of secret-key cryptography and trusted third parties to allow secure authentication to network services over untrusted networks. More information about the Kerberos protocol is available from MIT's Kerberos siteDesigning an Authentication System is an accessible introduction to the principals of Kerberos' authentication scheme.

Kerberos config ubuntu (fr)

Kerberos est un système d'authentification réseau basé sur le principe d'un tiers de confiance. Les deux autres parties sont l'utilisateur et le service sur lequel l'utilisateur veut s'authentifier. Tous les services et applications ne savent pas utiliser Kerberos, mais pour ceux qui en sont capables, cela rapproche l'environnement réseau d'un système à authentification unique (Single Sign On ou SSO).

Add self signed certificate to curl : ubuntu

Curl with self signed certificate

Sunday, March 5, 2017


WebM is an open, royalty-free, media file format designed for the web.
WebM defines the file container structure, video and audio formats. WebM files consist of video streams compressed with the VP8 or VP9 video codecs and audio streams compressed with the Vorbis or Opus audio codecs.
The WebM file structure is based on the Matroska container.
For more information about WebM, see the FAQ.
Developers: To get involved, visit their Code page.

Benefits of WebM

Openness and innovation. A key factor in the web’s success is that its core technologies such as HTML, HTTP, and TCP/IP are open for anyone to implement and improve. With video being core to the web experience, a high-quality, open video format choice is needed. WebM is 100% free, and open-sourced under aBSD-style license.

Optimized for the web. Serving video on the web is different from traditional broadcast and offline mediums. Existing video formats were designed to serve the needs of these mediums and do it very well. WebM is focused on addressing the unique needs of serving video on the web.

Low computational footprint to enable playback on any device, including low-power netbooks, handhelds, tablets, etc.

Simple container format

Highest quality real-time video delivery

Click and encode. Minimal codec profiles and sub-options. When possible, let the encoder make the tough choices.

Tuesday, February 28, 2017

Software Freedom needs your help.

Conservancy is continuing its shift towards being a Supporter-driven organization so we can focus on critical free software issues. Support our great member projects, stand up for the GPL, and make your voice heard in support of free software. We're counting on you.

Software is critical to all of our infrastructure and as a society, we are deeply reliant on the software we use. Making sure our software is free and open assures that tomorrow we can still use those solutions we invest in today. Software freedom is fundamental — we need it in order to effectively solve our problems in the long term. While the world today is powered increasingly by free software, many people don't realize is how much support is needed to keep all of these projects free and open. The work that we do every day ensures the success and the continued freedom of the projects. Our developers dedicate themselves to improving our member projects, and we enable them to do that. This includes projects like Git, Samba, Wine, BusyBox, QEMU, Inkscape, Selenium, and dozens more.
We are asking for you to . Last year, over 1,000 of you became annual Supporters, allowing us to continue our basic operations. We still need 2,500 (total) annual Supporters to continue our full range of operations through 2017. If you don't become a Supporter now, we will be forced to reduce our program activities going forward.

Thursday, January 26, 2017

Your 'Anonymized' Web Browsing History May Not Be Anonymous

Princeton University (01/19/17) John Sullivan 

Researchers at Princeton and Stanford universities have found a specific person's online behavior can be identified by linking anonymous Web browsing histories with social media profiles. Although the U.S. Federal Communications Commission recently adopted privacy rules for Internet service providers permitting them to store and use consumer information only when it is "not reasonably linkable" to individual users, the study suggests pseudonymous browsing histories fail this test. The researchers wanted to determine if it was possible to de-anonymize Web browsing and identify a user even if the browsing history did not include identities. They limited themselves to publicly available information, with social media profiles that include links to outside Web pages offering the strongest possibilities. The team created an algorithm to compare anonymous browsing histories with links appearing in people's public social media accounts. "Given a history with 30 links originating from Twitter, we can deduce the corresponding Twitter profile more than 50 percent of the time," the researchers note. "All the evidence we have seen piling up over the years showing the strong limits of data anonymization, including this study, really emphasizes the need to rethink our approach to privacy and data protection in the age of big data," says Imperial College London professor Yves-Alexandre de Montjoye.