History is littered with hundreds of conflicts over the future of a community, group, location or business that were "resolved" when one of the parties stepped ahead and destroyed what was there. With the original point of contention destroyed, the debates would fall to the wayside. Archive Team believes that by duplicated condemned data, the conversation and debate can continue, as well as the richness and insight gained by keeping the materials. Our projects have ranged in size from a single volunteer downloading the data to a small-but-critical site, to over 100 volunteers stepping forward to acquire terabytes of user-created data to save for future generations.
The main site for Archive Team is atarchiveteam.org and contains up to the date information on various projects, manifestos, plans and walkthroughs.
This collection contains the output of many Archive Team projects, both ongoing and completed. Thanks to the generous providing of disk space by the Internet Archive, multi-terabyte datasets can be made available, as well as in use by theWayback Machine, providing a path back to lost websites and work.
Our collection has grown to the point of having sub-collections for the type of data we acquire. If you are seeking to browse the contents of these collections, the Wayback Machine is the best first stop. Otherwise, you are free to dig into the stacks to see what you may find.
The Archive Team Panic Downloads are full pulldowns of currently extant websites, meant to serve as emergency backups for needed sites that are in danger of closing, or which will be missed dearly if suddenly lost due to hard drive crashes or server failures.
To use ArchiveBot, drop by #archivebot on EFNet. To interact with ArchiveBot, you issue commands by typing it into the channel. Note you will need channel operator permissions in order to issue archiving jobs. The dashboard shows the sites being downloaded currently.
There is a dashboard running for the archivebot process athttp://www.archivebot.com.
ArchiveBot's source code can be found athttps://github.com/ArchiveTeam/ArchiveBot.
LinuxKernel > SELinux
Security-Enhanced Linux (SELinux) is a project to implementmandatory access control under Linux. This project was initially developed by the National Security Agency (NSA), as a reference implementation.
For more information please check out theSELinux project's homepage orwikipedia.
The Debian packaged Linux kernels have SELinux support compiled in, but disabled by default. To enable it, see theSetup Notes.
Setup - How to setup your Debian system to use SELinux
Issues - Issues currently affecting SELinux support
Notes - Scratch space with some notes about SELinux use and setup
Please note that SELinux is a Linux-specific feature and Debian packages shouldn't assume it is present (unless they're Linux-specific packages for some reason).Note for developers: Remember to check whether this is a Linux platform by using dpkg-architecture variables in debian/rules, and conditionalise the libselinux Build-Dependency using [] tags. Something like [linux-any] should be fine.
There are mailing lists about SELinux support in Debian for both user support and development hosted on alioth. Use theSELinux lists overview to subscribe to the lists or browse the archives.
The upstreamSELinux Reference Policy maintenance is coordinated on theReference Policy mailing list.
Security-Enhanced Linux - Documentation - Red Hat -- this is probably the best documentation on SELinux available and almost all of it also applies to Debian.
SELinux Project Wiki -- "the official Security Enhanced Linux (SELinux) project page"
SELinux (last modified 2013-10-05 08:37:15)