Local web cache for restricted users question


 
Thread Tools Search this Thread
Top Forums UNIX for Dummies Questions & Answers Local web cache for restricted users question
# 1  
Old 06-03-2008
Local web cache for restricted users question

I am in charge of a project to teach 20 or so inmates basic computer skills. These people cannot have outside access to the web, but I need to show them how to do a basic Google search and search for articles on Wikipedia. (also needs to be Arabic and English)

I was thinking of using a squid proxy to cache all the sites on the server and then let them go to the predesignated sites and perform the predesignated searches. This method would probably be fine for me but the people teaching the class would have issues updating the cache with new content. (also I can't get squid to retain it's cache for over 1yr)

My question is, is there an easier method of doing this preferably with a web GUI to update the cache. Is their some easier method I could be using?
 
Login or Register to Ask a Question

Previous Thread | Next Thread

10 More Discussions You Might Find Interesting

1. Linux

File cache /Page cache Linux

Hi All, could any one point out any open source test-suites for "File cache" testing and as well as performance test suites for the same. Currently my system is up with Linux/ext4. Regards Manish (0 Replies)
Discussion started by: hmanish
0 Replies

2. Red Hat

Restrict local users to access ftp

Hi, I had installed vsftp in rhel5 and i want to restrict all the local users from accessing the ftp. i want to allow specific users to access the ftp server. Request you to please help. Thanks & regards Arun (1 Reply)
Discussion started by: Arun.Kakarla
1 Replies

3. Linux

getting info on Cache Size, Data Cache etc..

Hi all I saw in Microsoft web site www.SysInternals.com a tool called CoreInfo from able to print out on screen the size of the Data and Instruction caches of your processor, the Locigal to Physical Processor mapping, the number of the CPU sockets. etc.. Do you know if in Linux is available a... (2 Replies)
Discussion started by: manustone
2 Replies

4. Shell Programming and Scripting

check web server running on local and on remote machine

Hi , How to check whether web server is running from remote machine How to check whether web server is running on web server itself Can any one help me soon (1 Reply)
Discussion started by: satheeshkr_cse
1 Replies

5. OS X (Apple)

Permissions appear different for local and OD users

If I look at the permissions of a folder on a network share while using a local admin account on my computer, then authenticating as a open directory user to connect to the share, they appear completely different than if I had logged in as an OD user and looked at it, it also appears different from... (0 Replies)
Discussion started by: glev2005
0 Replies

6. UNIX for Advanced & Expert Users

Creating USERs with restricted Access

Hi There, i need to creat USERS in UNIX with restricted access to different directories. for example user1 should have access to dir1 and dir2 user2 should have access to dir2 and dir3 Please help me (4 Replies)
Discussion started by: ramanan25
4 Replies

7. IP Networking

can i force connecting to local web server via internet network ?

Hello all this is general question , if i have web server installed in my local pc and i have client that connecting to that web server can i force it always to go via the internet network ? the reason im asking is .. that im noticed when i close my internet connection i still can connect to my... (2 Replies)
Discussion started by: umen
2 Replies

8. UNIX for Dummies Questions & Answers

replicating restricted sam users

I'm in the process of setting up two new HP-UX 11.23 i64 servers. On my existing server (HP-UX B.11.0) we have several users defined to have restricted sam access. I'm having trouble finding those definitions and copying them over to the new servers. Is this possible - to just copy over the... (1 Reply)
Discussion started by: LisaS
1 Replies

9. Linux

Can Telnet in Linux 8.0 be restricted for users

Hi, I want to create a user and allow its to be able to have telnet session like what you have in the ftp allow and deny. Is this possible Thanx. (3 Replies)
Discussion started by: kayode
3 Replies

10. UNIX for Advanced & Expert Users

UBC cache vs. Metadata cache

hi, What is the difference between UBC cache and Metadata cache ? where can i find UBC cache Hits and Metadata cache Hits in hp-ux? Advanced thanx for the help. (2 Replies)
Discussion started by: sushaga
2 Replies
Login or Register to Ask a Question
CREEPY(1)						      General Commands Manual							 CREEPY(1)

NAME
CREEPY - A geolocation information aggregator DESCRIPTION
creepy is an application that allows you to gather geolocation related information about users from social networking platforms and image hosting services. The information is presented in a map inside the application where all the retrieved data is shown accompanied with rele- vant information (i.e. what was posted from that specific location) to provide context to the presentation. FEATURES
Map providers available : Google Maps - Virtual Maps - Open Street Maps Location information retieval from : Twitter's tweet location: Coordinates when tweet was posted from mobile device. Place (geographical name) derived from users ip when posting on twitter's web interface. Place gets translated into coordinates using geonames.com" Bounding Box derived from users ip when posting on twitter's web interface.The less accurate source , a corner of the bounding box is selected randomly. Geolocation information accessible through image hosting services API EXIF tags from the photos posted. Social networking platforms currently supported: Twitter Foursquare (only checkins that are posted to twitter). Image hosting services currently supported : flickr - information retrieved from API twitpic.com - information retrieved from API and photo exif tags yfrog.com - information retrieved from photo exif tags img.ly - information retrieved from photo exif tags plixi.com - information retrieved from photo exif tags twitrpix.com - information retrieved from photo exif tags foleext.com - information retrieved from photo exif tags shozu.com - information retrieved from photo exif tags pickhur.com - information retrieved from photo exif tags moby.to - information retrieved from API and photo exif tags twitsnaps.com - information retrieved from photo exif tags twitgoo.com - information retrieved from photo exif tags NOTES
Automatic caching of retrieved information in order to reduce API calls and the possibility of hitting limit rates. GUI with navigable map for better overview of the accumulated information 4 Maps providers (including Google Maps) to use. Open locations in Google Maps in your browser Export retrieved locations list as kmz (for Google Earth) or csv files. Handling twitter authentication in an easy way using oAuth. User credentials are not shared with the application. User/target search for twitter and flickr. AUTHOR
creepy was written by Yiannis Kakavas <jkakavas@gmail.com> This manual page was written by Daniel Echeverry for the Debian GNU/Linux system (but may be used by others). SEE ALSO
The full documentation which includes the keys descriptions is in /usr/share/doc/creepy/README. MAY 08, 2011 CREEPY(1)