t001-new-homepage.txt - adamsgaard.dk - my academic webpage
(HTM) git clone git://src.adamsgaard.dk/adamsgaard.dk
(DIR) Log
(DIR) Files
(DIR) Refs
(DIR) README
(DIR) LICENSE
---
t001-new-homepage.txt (2074B)
---
1 I have had my own webpage since 2002 (a-d-c.dk, cs.au.dk/~adc,
2 adamsgaard.dk). I use a webpage as a place to keep my contact
3 information, software, notes, and research. The previous iteration
4 was inspired by the 2015 April 1st retro-version of of gentoo.org,
5 bringing back memories of the computing of yesteryear.
6
7 The previous backend was a Debian GNU/Linux virtual machine, first
8 running at home and then in the cloud. It dynamically served the
9 pages with Apache and PHP. However, PHP is notoriously insecure,
10 as evident by the extensive list of vulnerabilities[0]. Apache is
11 not much better[1].
12
13 This weekend I finally made the long-overdue transition to a static
14 web page, which improves security and performance. The backend is
15 an OpenBSD instance at a cloud provider. There's a plethora of
16 free static hosting providers available, but I prefer running and
17 maintaining a server myself. The SSL certificate is provided by
18 Let's Encrypt. The html front end is generated using Hiltjo
19 Posthuma's saait[2] and stagit[3].
20
21 I am keeping the retro theme, but all CSS is reduced to a bare
22 minimum. The page is entirely free of cookies, javascript, and
23 tracking. It is also 100% compatible with terminal browsers.
24
25 I moved all of my personal software projects to my own git server
26 at https://src.adamsgaard.dk. I do not trust corporations like
27 Github (Microsoft), Gitlab, Sourceforce, etc., to always act in the
28 users' best interest. However, for the time being I will continue
29 to contribute to other software projects on these platforms.
30
31 My git server has a web interface[4] which provides an overview of
32 projects, commits, and files. Git access is possible through git
33 (read only) and ssh (r/w) protocols.
34
35 Please let me know if you encounter any problems with the new
36 infrastructure.
37
38
39 References:
40
41 [0] https://www.cvedetails.com/vulnerability-list.php?vendor_id=74&product_id=128
42 [1] https://www.cvedetails.com/vulnerability-list/vendor_id-45/Apache.html
43 [2] https://git.codemadness.nl/saait
44 [3] https://git.codemadness.nl/stagit
45 [4] https://src.adamsgaard.dk