Soluții

How to Lock Chrome Incognito Tabs With Face ID on iPhone and iPad

Looking to keep your mobile browsing in Google Chrome private and secure?

Whatever you think of it, Chrome remains one of the most popular browsers on ‌iPhone‌ and ‌iPad‌, which is why Google continues to work on new features to differentiate it from Apple’s Safari. With this in mind, one of the more unique tools in its feature set is the ability to use ‌Face ID‌ and ‌Touch ID‌ with Incognito tabs.

With this feature enabled, you can browse the internet using Incognito tabs and exit the app without closing them, safe in the knowledge that the tabs won’t be visible until authenticated with either ‌Face ID‌ or ‌Touch ID‌, depending on your device. This way, if someone gets hold of your device, they won’t be able to just open Chrome to view your Incognito tabs.

Not only will no-one be able to view your tabs, thanks to Incognito mode, none of your browsing history, cookies and site data, or information entered in forms are saved on your device. This means that your activity doesn’t appear in your Chrome browser history, so no-one will see your activity either.

Note that Incognito tabs are opened separately from regular tabs in Chrome. If you’ve used Safari on ‌iPhone‌ or ‌iPad‌, it’s similar to the way Private Browsing works, except in Safari you don’t have the option to lock those tabs behind device authentication.

The following steps show you how to enable biometric authentication for Incognito tabs in Chrome.

[mai mult...]

Restrict access to a website to some IP Addresses using the web.config file

In this post we’ll deal with one of the most undervalued and semi-unknown features of Internet Information Services, better known as IIS, the web server shipped with most Windows client and servers distributions – from Windows 95 to Windows 10 and Windows Server 2019: the IP and Domain Restrictions role service, which allows the system administrator to allow or deny access to the web server, web sites, folders, or files through various rules that can be configured for remote IP addresses or based on the domain name.

[mai mult...]

Linux – Resize-Extend a disk partition with unallocated space (CentOS, Ubuntu, VM)

Expanding disk partitions to use all the available (unallocated) disk space is a common issue among Linux Administrators, expecially when working in a VMware-based Cloud environment. This often happens when deploying a Linux VM from an existing template using managed services like Amazon AWS or MS Azure, when we usually end up with disk partitions smaller than the disk space allocated during the VM configuration phase; but it can also happen after the deployment, for example when our VM’s main disk runs out of space – and we want to further expand it by allocating additional space from the vCenter.

[mai mult...]

Linux – Set default permissions when creating new Files with SSH/FTP

The problem we want to fix is very similar to the one related to the default group: every time you upload some new files to a folder (such as var/www) that has specific group access (such as www-data) using your favorite SSH or FTP(s) client, those files are created with a default permission set (typically read-only) instead of having the read, write and/or execute permissions like we would like to.

[mai mult...]