Spellcheck

This commit is contained in:
Keith Irwin 2023-03-15 16:33:05 -06:00
parent a856a53205
commit dc0625b9e4
Signed by: ki9
GPG Key ID: DF773B3F4A88DA86
20 changed files with 39 additions and 48 deletions

View File

@ -6,12 +6,3 @@ eleventyExcludeFromCollections: true
# ✖️ Content not found
Go <a href="{{ '/' | url }}">home</a>.
{#
Read more: https://www.11ty.dev/docs/quicktips/not-found/
This will work for both GitHub pages and Netlify:
* https://help.github.com/articles/creating-a-custom-404-page-for-your-github-pages-site/
* https://www.netlify.com/docs/redirects/#custom-404
#}

View File

@ -1,4 +1,4 @@
**Linux** is an open-source operating system, offering increased privacy and security. Linux computers recieve security updates for decades and are easier to maintain, repair, and upgrade. This makes them immune from planned obsolesence. Linux computers are virtually immune to viruses too.
**Linux** is an open-source operating system, offering increased privacy and security. Linux computers receive security updates for decades and are easier to maintain, repair, and upgrade. This makes them immune from planned obsolescence. Linux computers are virtually immune to viruses too.
**Why would you switch to linux?** You might be concerned about how [windows tracks you](https://www.youtube.com/watch?v=IT4vDfA_4NI). Or maybe you're tired of buying a new mac every few years [when your battery stops working](https://en.wikipedia.org/wiki/Batterygate)? Maybe you don't want to see [ads in your filemanager](https://www.pcmag.com/news/microsoft-experiments-with-ads-in-windows-11-file-explorer). Or you just don't like that it's *possible* for anyone to inject ads and trackers on a computer you paid for.

View File

@ -14,4 +14,4 @@ Software center:
Theming:
[![A screenshot of xfce 4.14 with vaious themes](/assets/img/screenshots/xfce/4-14.png)](/assets/img/screenshots/xfce/4-14.png)
[![A screenshot of xfce 4.14 with various themes](/assets/img/screenshots/xfce/4-14.png)](/assets/img/screenshots/xfce/4-14.png)

View File

@ -1,13 +1,13 @@
---
layout: layouts/base.njk
title: Warrent canary
title: Warrant canary
---
# 🐦 {{title}}
What is a **warrent canary**? The U.S. government has a legal right to obtain a search warrent and subpoena us for our users' data. Typically, such subpoenas come with a "gag order" legally preventing the company from disclosing that its data have been subject to search and seizure.
What is a **warrant canary**? The U.S. government has a legal right to obtain a search warrant and subpoena us for our users' data. Typically, such subpoenas come with a "gag order" legally preventing the company from disclosing that its data have been subject to search and seizure.
According to the [Wikipedia article on Warrent Canaries](https://en.wikipedia.org/wiki/Warrant_canary) (retrieved 2023-03-11):
According to the [Wikipedia article on Warrant Canaries](https://en.wikipedia.org/wiki/Warrant_canary) (retrieved 2023-03-11):
> The warrant canary typically informs users that there has *not* been a court-issued subpoena as of a particular date. If the canary is not updated for the period specified by the host or if the warning is removed, users might assume the host has been served with such a subpoena. The intention is for a provider passively to warn users of the existence of a subpoena, albeit violating the spirit of a court order not to do so, while not violating the letter of the order.

View File

@ -33,7 +33,7 @@ Generally, the best CPUs can be determined by checking these stats:
- **Clock speed**, measured in GHz: Determines how many billion computations can be done in each core (thread) per second. Higher numbers are faster chips.
- **Model number**: Chipmakers do make incremental changes to their designs which result in small performance improvements. So, all other things being equal, look for later model numbers.
Processors can sometimes be upgraded, but the socket must be compatible with the new chip. AMD and Intel, the two big processor-makers each have their own socket type, so you can't replace an Intel CPU with an AMD CPU. GPUs are generally mounted on a graphics card which is easily interchangable.
Processors can sometimes be upgraded, but the socket must be compatible with the new chip. AMD and Intel, the two big processor-makers each have their own socket type, so you can't replace an Intel CPU with an AMD CPU. GPUs are generally mounted on a graphics card which is easily interchangeable.
## 💾 Storage

View File

@ -18,29 +18,29 @@ We offer monero (xmr) rewards for any issues with our site or infrastructure, fr
| 2.0 | **Persistent XSS** | Any cross-site scripting attack that is saved on our server |
| 3.0 | **Partial database or maildir** | Unauthorized access to data or emails |
| 6.0 | **Complete database or maildir** | Unauthorized dump of all data or emails (paid per instance) |
| 12.0 | **Unpriviledged code execution** | Code execution as a non-root user on any of our servers |
| 15.0 | **Priviledged code execution** | Code execution as a root user on any of our servers |
| 12.0 | **Unprivileged code execution** | Code execution as a non-root user on any of our servers |
| 15.0 | **Privileged code execution** | Code execution as a root user on any of our servers |
We do *not* pay extortionists to prevent leaks or unlock ransomware. That means the bounties above, modest though they may be, are the only reward available.
Finding a bug is not a guarantee of a payout. For example, ending an english sentence with a preposition is technically incorrect, but so common that we do it intentionally. Use of the word "data" as a singular noun is another example of a grammar error that we would not pay out due to its pettiness. That said, we have a strong incentive to compensate white-hats and will always pay for a non-trivial bug.
Finding a bug is not a guarantee of a payout. For example, ending an English sentence with a preposition is technically incorrect, but so common that we do it intentionally. Use of the word "data" as a singular noun is another example of a grammar error that we would not pay out due to its pettiness. That said, we have a strong incentive to compensate white-hats and will always pay for a non-trivial bug.
The list above is not comprehensive, so if you find a bug of a type not listed above, please send it anyway and we may negotiate a reward.
## Permitted hacking activites
## Permitted hacking activities
White-hats are welcome to perfom any kind of recon and penetration except the attack types listed below. Yes, this is explicit written permission from the company for anyone anywhere to perform port scans, database injections, xss attacks, or exploitation of software vulnerabilities. The only activities NOT allowed are:
White-hats are welcome to perform any kind of recon and penetration except the attack types listed below. Yes, this is explicit written permission from the company for anyone anywhere to perform port scans, database injections, XSS attacks, or exploitation of software vulnerabilities. The only activities NOT allowed are:
- Physical attacks (break-ins)
- Social engineering (including spearphishing)
- Social engineering (including spear-phishing)
- Intentional disruption to our services (DDOSing)
- Unintentional disruption to our services (performing any *permitted* attack with such vigor that it causes a disruption)
Execution of any of these listed attack types will never result in a bounty reward and may result in prosecution of perpretrators.
Execution of any of these listed attack types will never result in a bounty reward and may result in prosecution of perpetrators.
## Disclosure timeline
We observe a 90-day disclosure timeline, starting from our acknowledgement of the bug. This means, you must not publish or disseminate details of the exploit until we have time to fix it (90 days). After that period, the hacker is free to publish details of the exploit on their security blog or anywhere. Hackers disclosing details of their exploit *before* the closure of the 90-day window will not be elligible for a bounty and may be prosecuted. Hackers are *never* permitted to publish any sensitive data or intellectual property from the company or its users.
We observe a 90-day disclosure timeline, starting from our acknowledgment of the bug. This means, you must not publish or disseminate details of the exploit until we have time to fix it (90 days). After that period, the hacker is free to publish details of the exploit on their security blog or anywhere. Hackers disclosing details of their exploit *before* the closure of the 90-day window will not be eligible for a bounty and may be prosecuted. Hackers are *never* permitted to publish any sensitive data or intellectual property from the company or its users.
## Previously-awarded bounties
@ -50,6 +50,6 @@ All bounties are posted with the hacker's permission, so we may have paid out bo
## Securely reporting a bug
So you've found a bug or vulerability! Please responsibly disclose it using the form below. Any data entered in this form will be PGP-encrypted on the client-side before being submitted.
So you've found a bug or vulnerability! Please responsibly disclose it using the form below. Any data entered in this form will be PGP-encrypted on the client-side before being submitted.
{% include 'bug-disclosure-form.njk' %}

View File

@ -5,7 +5,7 @@ title: Policies
# 📜 {{title}}
Our company has several policies regarding this website. By using this website, you agree to these policies, including (but not necesarily limited to) our [Terms of Service](tos) and [Privacy Policy](privacy). To learn more about the legal underpinnings of this website, please review the following documents:
Our company has several policies regarding this website. By using this website, you agree to these policies, including (but not necessarily limited to) our [Terms of Service](tos) and [Privacy Policy](privacy). To learn more about the legal underpinnings of this website, please review the following documents:
- [**Terms of Service >**](tos)
- [**Privacy Policy >**](privacy)

View File

@ -5,7 +5,7 @@ title: Privacy Policy
# 🤐 {{title}}
We care about speed and privacy on this website, which is why we don't have any trackers, telemtry, or analytics (third-party or otherwise). You can audit this by checking the source code of any page on the site. The server-side code is open-source too and available for review on our gitea: [slvit/www](https://gitea.slvit.us/slvit/www/).
We care about speed and privacy on this website, which is why we don't have any trackers, telemetry, or analytics (third-party or otherwise). You can audit this by checking the source code of any page on the site. The server-side code is open-source too and available for review on our Gitea: [slvit/www](https://gitea.slvit.us/slvit/www/).
This site is statically-generated and uses minimal javascript. When javascript is used, it's usually auditable, open-source code that we wrote. The only js libraries we import are [Stripe's SDK](https://github.com/stripe/stripe-js) and the ultra-tiny [KnockoutJS](https://github.com/SteveSanderson/knockout). These are *only* imported on pages that require them. For example, if you place an order with cryptocurrency, Stripe's SDK will not be loaded.
@ -25,7 +25,7 @@ These data are usually cleared when you clear your browser's cache or site data.
## 🏢 Data stored in our server
Data stored on our server is stored securely and accessed only by employees. However, U.S. law provides agencies the right to obtain a search warrent and subpoena us for these data. We comply with all U.S. laws, but provide some protection to our users by providing a [warrent canary](/canary/).
Data stored on our server is stored securely and accessed only by employees. However, U.S. law provides agencies the right to obtain a search warrant and subpoena us for these data. We comply with all U.S. laws, but provide some protection to our users by providing a [warren canary](/canary/).
Generally speaking, we collect as little data as possible. Here is a complete list of *all* data we collect and store:
@ -82,7 +82,7 @@ None of the data listed on this page so far are shared with any third-party unti
(To view your IP and user agent, you can visit [ifconfig.me](https://ifconfig.me/).)
When you create an order, the followingadditional data is sent to [stripe](https://stripe.com/). These data may change as Stripe changes their policies, so this list may be incomplete or outdated. For the latest information, consult [their privacy policy](https://stripe.com/privacy).
When you create an order, the following additional data is sent to [stripe](https://stripe.com/). These data may change as Stripe changes their policies, so this list may be incomplete or outdated. For the latest information, consult [their privacy policy](https://stripe.com/privacy).
- The total amount
- Your shipping address
@ -100,8 +100,8 @@ When you execute the payment, the following additional data is sent to [stripe](
**IMPORTANT!** By making credit/debit card payments on this website, you agree to Stripe's [End User Terms of Service](https://stripe.com/legal/end-users) and [Privacy Policy](https://stripe.com/privacy).
## 🐦 Warrent canary
## 🐦 Warrant canary
Here is a copy of our latest [warrent canary](/canary/).
Here is a copy of our latest [warrant canary](/canary/).
{% include 'canaries/2023-03-11.md' %}

View File

@ -7,4 +7,4 @@ title: Refund/return policy
Generally speaking, if you buy something from our [store](/shop/), you can refund it in new condition within 90 days for a full refund or replacement.
For computers and other reperable items, if possible, we can also provide a repair under warrenty within 90-days. After 90 days we offer[computer/electronic repairs](/services/support/repairs/) at reasonable rates.
For computers and other reparable items, if possible, we can also provide a repair under warranty within 90-days. After 90 days we offer[computer/electronic repairs](/services/support/repairs/) at reasonable rates.

View File

@ -26,11 +26,11 @@ By using the Website, You warrant that You have read and reviewed this Agreement
## 3) LICENSE TO USE WEBSITE
The Company may provide You with certain information as a result of Your use of the Website or Services. Such information may include, but is not limited to, documentation, data, or information developed by the Company, and other materials which may assist in Your use of the Website or Services ("Company Materials"). Subject to this Agreement, the Company grants You a non-exclusive, limited, non-transferable and revocable license to use the Company Materials solely in connection with Your use of the Website and Services. The Company Materials may not be used for any other purpose, and this license terminates upon Your cessation of use of the Website or Services or at the termination of this Agreement. Open-source materials released by the Company may be subject to licensing agreements that contradict and take precendent over the general agreement of this section.
The Company may provide You with certain information as a result of Your use of the Website or Services. Such information may include, but is not limited to, documentation, data, or information developed by the Company, and other materials which may assist in Your use of the Website or Services ("Company Materials"). Subject to this Agreement, the Company grants You a non-exclusive, limited, non-transferable and revocable license to use the Company Materials solely in connection with Your use of the Website and Services. The Company Materials may not be used for any other purpose, and this license terminates upon Your cessation of use of the Website or Services or at the termination of this Agreement. Open-source materials released by the Company may be subject to licensing agreements that contradict and take precedent over the general agreement of this section.
## 4) INTELLECTUAL PROPERTY
You agree that the Website and all Services provided by the Company are the property of the Company, including all copyrights, trademarks, trade secrets, patents, and other intellectual property ("Company IP"). You agree that the Company owns all right, title, and interest in and to the Company IP and that You will not use the Company IP for any unlawful or infringing purpose. You agree not to reproduce or distribute the Company IP in any way, including electronically or via registration of any new trademarks, trade names, service marks or Uniform Resource Locators (URLs), without express written permission from the Company. Open-source materials released by the Company may be excepmt from the requirements of this section if the material is provided with a seperate license that designates the material as open-source and not Company IP.
You agree that the Website and all Services provided by the Company are the property of the Company, including all copyrights, trademarks, trade secrets, patents, and other intellectual property ("Company IP"). You agree that the Company owns all right, title, and interest in and to the Company IP and that You will not use the Company IP for any unlawful or infringing purpose. You agree not to reproduce or distribute the Company IP in any way, including electronically or via registration of any new trademarks, trade names, service marks or Uniform Resource Locators (URLs), without express written permission from the Company. Open-source materials released by the Company may be except from the requirements of this section if the material is provided with a separate license that designates the material as open-source and not Company IP.
## 5) PAYMENT & FEES
@ -49,7 +49,7 @@ You agree not to use the Website or Services for any unlawful purpose or any pur
## 7) ASSUMPTION OF RISK
The Website and Services are provided for communication, entertainment, and commerce purposes only. The Company makes a "best effort" attempt to provide correct and accurate inforamtion, however, the Company can not guarantee the accuracy of everything on the Website. You acknowledge and agree that any information posted on Our Website is not intended to be legal advice, medical advice, or financial advice, and no fiduciary relationship has been created between You and the Company. You further agree that Your purchase of any of the products on the Website is at Your own risk. The Company does not assume responsibility or liability for any advice or other information given on the Website. If you find any inaccuracies in our website, please report them using the [form on our bug bounty page](/policies/bug-bounty/).
The Website and Services are provided for communication, entertainment, and commerce purposes only. The Company makes a "best effort" attempt to provide correct and accurate information, however, the Company can not guarantee the accuracy of everything on the Website. You acknowledge and agree that any information posted on Our Website is not intended to be legal advice, medical advice, or financial advice, and no fiduciary relationship has been created between You and the Company. You further agree that Your purchase of any of the products on the Website is at Your own risk. The Company does not assume responsibility or liability for any advice or other information given on the Website. If you find any inaccuracies in our website, please report them using the [form on our bug bounty page](/policies/bug-bounty/).
## 8) SALES

View File

@ -37,7 +37,7 @@ Already have a website? Save money and hassle by hosting with us. Our secure h
| [**Static site hosting**](hosting/static/) | ${{prices.hosting.www.static.month}}/month |
| [**WordPress hosting**](hosting/wordpress/) | ${{prices.hosting.www.wordpress.month}}/month |
| [**Mailserver hosting**](hosting/email/) | ${{prices.hosting.mailserver.month}}/month |
| [**Nextcloud hosting**](hosting/nextcloud/) | ${{prices.hosting.nextcloud.month}}/month |
| [**NextCloud hosting**](hosting/nextcloud/) | ${{prices.hosting.nextcloud.month}}/month |
| [**Rainloop hosting**](hosting/email/) | ${{prices.hosting.rainloop.month}}/month |
| [**Gitea hosting**](hosting/gitea/) | ${{prices.hosting.gitea.month}}/month |
| [**Odoo hosting**](hosting/odoo/) | ${{prices.hosting.odoo.month}}/month |

View File

@ -23,7 +23,7 @@ Each mailserver is provided an unlimited number of users on an unlimited number
**Rainloop** is a webmail client. It provides a simple interface for users to log in and access emails from a mailserver. Mail clients are an easy alternative to configuring each user's desktop mail client (Thunderbird, Apple Mail, Outlook, etc). However, hosting a webmail instance won't inhibit users' connections should they chose to use their desktop client.
Our rainloop instances can be hosted on your domain or hosted as an app in [nextcloud](/services/hosting/nextcloud). They can be made accessible over the internet or limited to a private [VPN](/services/hardware/vpn).
Our Rainloop instances can be hosted on your domain or hosted as an app in [NextCloud](/services/hosting/nextcloud). They can be made accessible over the internet or limited to a private [VPN](/services/hardware/vpn).
> [**Rainloop Demo** >](https://mail.rainloop.net/)

View File

@ -10,7 +10,7 @@ eleventyNavigation:
# 🏢 {{title}}
Affordable hosting that just works. Let us host your existing Wordpress, mailserver, or nextcloud for a fraction of what you're paying now. If you don't have one already, we also *build* [simple basic websites](/services/websites). All hosting comes with SSL encryption, docker containerization, and domain name service.
Affordable hosting that just works. Let us host your existing Wordpress, mailserver, or NextCloud for a fraction of what you're paying now. If you don't have one already, we also *build* [simple basic websites](/services/websites). All hosting comes with SSL encryption, docker containerization, and domain name service.
## Encryption
@ -41,7 +41,7 @@ All hosting services come with a 100gb disk quota, but additional space can be m
| [**Static site hosting**](static/) | ${{prices.hosting.www.static.month}}/month |
| [**WordPress hosting**](wordpress/) | ${{prices.hosting.www.wordpress.month}}/month |
| [**Mailserver hosting**](email/) | ${{prices.hosting.mailserver.month}}/month |
| [**Nextcloud hosting**](nextcloud/) | ${{prices.hosting.nextcloud.month}}/month |
| [**NextCloud hosting**](nextcloud/) | ${{prices.hosting.nextcloud.month}}/month |
| [**Rainloop hosting**](email/) | ${{prices.hosting.rainloop.month}}/month |
| [**Gitea hosting**](gitea/) | ${{prices.hosting.gitea.month}}/month |
| [**Odoo hosting**](odoo/) | ${{prices.hosting.odoo.month}}/month |

View File

@ -10,13 +10,13 @@ eleventyNavigation:
# {{title}}
[**NextCloud**](https://nextcloud.com/) is an [open-source](/posts/2021/10/01/what-is-open-source/) groupware application. SLVIT offers containerized nextcloud instance hosting on our private dedicated server.
[**NextCloud**](https://nextcloud.com/) is an [open-source](/posts/2021/10/01/what-is-open-source/) groupware application. SLVIT offers containerized NextCloud instance hosting on our private dedicated server.
With nextcloud, your users can log into an online dashboard. The dashboard hosts apps like a calendar, contacts, password manager, mapping tools, and so on. [Webmail instances](/services/hosting/email/) can also be hosted as an app in nextcloud.
With NextCloud, your users can log into an online dashboard. The dashboard hosts apps like a calendar, contacts, password manager, mapping tools, and so on. [Webmail instances](/services/hosting/email/) can also be hosted as an app in NextCloud.
Nextcloud emulates the functionality found in google for business or Outlook Exchange. It's built with battle-hardened open source php.
NextCloud emulates the functionality found in google for business or Outlook Exchange. It's built with battle-hardened open source php.
Nextcloud instances can be available over the internet or limited to a private [VPN](/services/hardware/vpn)
NextCloud instances can be available over the internet or limited to a private [VPN](/services/hardware/vpn)
| | |
|:----------------------|------------------------------------------:|

View File

@ -10,7 +10,7 @@ eleventyNavigation:
# {{title}}
**Odoo** is open-source business software. SLVIT offers containerized odoo instance hosting on our private dedicated server.
**Odoo** is open-source business software. SLVIT offers containerized Odoo instance hosting on our private dedicated server.
You can use Odoo to handle your website, inventory, ecommerce, ERP, CRM, etc. Odoo is modular and has many apps you can install to fit your needs. There's more information about it on the [Odoo website](https://www.odoo.com/).

View File

@ -36,7 +36,7 @@ price: {
password: hm7wm5o5
---
This is a used Dell desktop computer in good condition. This machine has a large chasis for easy upgrades and expansions. It features a 256GB SSD, 8-thread CPU, AMD GPU, and 32GB of memory. That makes this machine fast for everyday use and acceptable for light gaming.
This is a used Dell desktop computer in good condition. This machine has a large chassis for easy upgrades and expansions. It features a 256GB SSD, 8-thread CPU, AMD GPU, and 32GB of memory. That makes this machine fast for everyday use and acceptable for light gaming.
## Photos
These are photos of the actual unit for sale.

View File

@ -36,7 +36,7 @@ price: {
password: LHVtrLqW4
---
This is a used Dell desktop computer in good condition. This machine has a large chasis for easy upgrades and expansions. It features a 512 GB SSD, 8-thread CPU, AMD Radeon GPU, and 16GB of memory. That makes this machine fast for everyday use and acceptable for light gaming.
This is a used Dell desktop computer in good condition. This machine has a large chassis for easy upgrades and expansions. It features a 512 GB SSD, 8-thread CPU, AMD Radeon GPU, and 16GB of memory. That makes this machine fast for everyday use and acceptable for light gaming.
## Photos
These are photos of the actual {{make}} {{model}} for sale.

View File

@ -56,7 +56,7 @@ Showing ports, from left to right:
- Analog mouse and keyboard
- 3x DisplayPorts
- RS232
- Etherenet and 6x USB-A
- Ethernet and 6x USB-A
- 3.5mm speaker and 3.5mm mic
- DMS-59 dual display ports on graphics card
- Standard NEMA power port

View File

@ -41,7 +41,7 @@ This is a small and lightweight laptop with a touchscreen. Under the hood it ha
**NOTE!** This laptop doesn't overheat but can run pretty hot. Therefore, it's best used on a desk and *not* your lap!
**NOTE!** The battery on this used laptop is untested and *proably* won't hold a charge for very long.
**NOTE!** The battery on this used laptop is untested and *probably* won't hold a charge for very long.
## Photos
These are photos of the actual unit for sale.

View File

@ -39,7 +39,7 @@ password: WR7fC2Vs
This is an used laptop computer in very good condition. It has an 8-thread CPU, 8 GB of RAM, and a 256 GB SSD, which is perfectly good for a non-gaming laptop. This laptop has a large 17" screen which makes it great for watching streams around the house.
**NOTE!** The battery on this used laptop is untested and *proably* won't hold a charge for very long.
**NOTE!** The battery on this used laptop is untested and *probably* won't hold a charge for very long.
## Photos