001-new-homepage.txt (2074B)
1 I have had my own webpage since 2002 (a-d-c.dk, cs.au.dk/~adc, 2 adamsgaard.dk). I use a webpage as a place to keep my contact 3 information, software, notes, and research. The previous iteration 4 was inspired by the 2015 April 1st retro-version of of gentoo.org, 5 bringing back memories of the computing of yesteryear. 6 7 The previous backend was a Debian GNU/Linux virtual machine, first 8 running at home and then in the cloud. It dynamically served the 9 pages with Apache and PHP. However, PHP is notoriously insecure, 10 as evident by the extensive list of vulnerabilities[0]. Apache is 11 not much better[1]. 12 13 This weekend I finally made the long-overdue transition to a static 14 web page, which improves security and performance. The backend is 15 an OpenBSD instance at a cloud provider. There's a plethora of 16 free static hosting providers available, but I prefer running and 17 maintaining a server myself. The SSL certificate is provided by 18 Let's Encrypt. The html front end is generated using Hiltjo 19 Posthuma's saait[2] and stagit[3]. 20 21 I am keeping the retro theme, but all CSS is reduced to a bare 22 minimum. The page is entirely free of cookies, javascript, and 23 tracking. It is also 100% compatible with terminal browsers. 24 25 I moved all of my personal software projects to my own git server 26 at https://src.adamsgaard.dk. I do not trust corporations like 27 Github (Microsoft), Gitlab, Sourceforce, etc., to always act in the 28 users' best interest. However, for the time being I will continue 29 to contribute to other software projects on these platforms. 30 31 My git server has a web interface[4] which provides an overview of 32 projects, commits, and files. Git access is possible through git 33 (read only) and ssh (r/w) protocols. 34 35 Please let me know if you encounter any problems with the new 36 infrastructure. 37 38 39 References: 40 41 [0] https://www.cvedetails.com/vulnerability-list.php?vendor_id=74&product_id=128 42 [1] https://www.cvedetails.com/vulnerability-list/vendor_id-45/Apache.html 43 [2] https://git.codemadness.nl/saait 44 [3] https://git.codemadness.nl/stagit 45 [4] https://src.adamsgaard.dk