You are not logged in.
slicehost.com? their basic VPS with 10GB of storage and 256 meg of RAM is pretty good for $20, they have an Arch Slice as well.
Last edited by jshield (2010-03-04 02:10:20)
Offline
Anikom15 wrote:* Currently nothing in open source is even close to Gmail's user interface.
What? Web interfaces are horrid.
This, of course, is the opinion of a seasoned, hardcore Arch user. You have to take into account that perhaps tss's outlook is different from your own.
Also, we could easily get into a 'user-friendly' vs. 'good' debate, but I don't think that would be wise.
I'm a "seasoned, hardcore Arch user" and I think Gmail's web UI is the best MUA I've ever seen. So I don't think such a debate is even intelligible, let alone wise
Offline
I'm a "seasoned, hardcore Arch user" and I think Gmail's web UI is the best MUA I've ever seen. So I don't think such a debate is even intelligible, let alone wise
I did not say 'seasoned, hardcore Arch user' in the general sense. I was speaking specifically of Anikom15.
Again, 'best' vs. 'horrid' is subjective.
** Do I agree with Anikom15 that Gmail is full of stupid? Yes, I do. But I recognize that it works well for other people.
Last edited by Peasantoid (2010-03-03 18:07:18)
Offline
* Currently nothing in open source is even close to Gmail's user interface.
What? Web interfaces are horrid.
i like gmails interface, especially since i found out about the keyboard shortcuts (mutt user)
i'm hosting my mails with postfix/dovecot/sieve, tried several webmail interfaces like squirrelmail, horde and roundcube, but every one of them (ok except horde) lacks in the bad threaded view of mails (one thing i don't like about gmail either). roundcube also missing the feature to create filters within the interface.
any tipps for another webmail interfaces?
Offline
* Authentication to POP3/IMAP and SMTP done in the clear. Vulnerable to sniffing.
* Authentication to POP3/IMAP and SMTP done using a self signed certificate. Vulnerable to man in the middle attacks.
* Running a mail transfer agent with a history of security problems (i.e. Sendmail). Qmail or Postfix are the correct choices here. Vulnerable to the latest zero day and recent published exploits. Professionals have an array of tricks (ex: chroot) to lessen the impact of exploits. They also run network intrusion detection systems to stop malicious traffic before it ever reaches the mailserver.
I think point two is only partially valid. If you own the server you know when your certificate is about to change. So if your certificate changes without your doing you know something is wrong
Offline