Syndicate content
  • I've been looking around every now and then to try to understand how I could create a server that replies on the correct Ethernet port.

    The idea is simple, we have very powerful servers that can handle many requests, more requests that one Ethernet port can handle. In other words, we could have 2, 3, 4, probably even 10 Ethernet connections (it really depends on your application, of course: how much RAM you need, how much processing is necessary for each access, etc.)

    The solution is to use the ip command line which allows us to add default gateways for each ethernet card based on the ...

  • How it works

    The at command is often used to start a process at a later time. It can run any script at a specified date and time.

    For instance, if you want the computer to send you a signal in one hour, use something like:

    cat signal | at -q z now + 60 minutes

    Assuming that the file named signal contains the commands necessary to generate the signal. Then in 60 minutes, the script will be execute and the signal will be heard or shown.

  • Since the ZmEu attack, I've been watching my logs a little closer. I also found a page that I could not read (but Google could and was kind enough to provide a cached version.) That page listed many bots that are not nice bots. So? I decided to block some of them, especially those that use very bad URLs or load many pages too quickly.

    The result is that I'm getting more and IP addresses in my firewall. Although they get removed in a schedule that I will not state here, I can tell you that each time I block tenth when not hundredth of useless hits (worst than that at times those could be

  • Who is ZmEu?

    An image showing ZmeuThe name Zmeu (no capital E) is the name of a fantastic creature of Romania. There are so many stories that there isn't a clear understanding of what it is... but it is human like, can spit fire and wants to marry young women.

    If you're wondering, it is generally a bad guy.

    ZmEu Attack

    Today, I noticed a lot of traffic on one of my servers. Looking into what was happening, I immediately found out that an attacker was looking for a loophole in that system. That attack was being performed from China.

  • I had Ubuntu 6.04 and there were many errors about Audio drivers and devices not working. I turned it off and that was it at the time.

    Now that I have upgraded to Ubuntu 8.04 (avoiding the bug in October Debug in regard to a huge error in generating an SSL key and all of that!), I thought I'd try again.

    I use VLC so I tried to run with that. I could see the audio equalizer so I thought that it should be working and we should hear the audio... but nothing at all. And VLC would spit out an error about the pulse audio deamon not working properly:

  • Since my last upgrade, I had many small things that went awry on my computer. From tsearch2 in a Postgres database to ownership of files to the following authentication problem:

    root@mycomputer:~# su - www-data
    su: Authentication service cannot retrieve authentication info
    (Ignored)
    www-data@mycomputer:~$
    

    Note that with su it ignores the fact. With cron it was not being ignored, so I'd get no work done!

  • In MS-Access, you can select a special value for your combo boxes called:

    "Find a record on my form based on the value I selected in my combo box"

    In older versions of MS-Access, all you had to do is select the option and be done with it. However, the option would have no effect if the form was not properly assigned a source query.

    In order to paliate to that problem, Microsoft decided to check the current form status and, if unlinked, hide the option altogether so you cannot make a mistake.

    The problem is that for many people the train of thought was not automatically that way.

  • You may have noticed that whenever you create a Datasheet you can double click on the right edge to resize the column to the widest text currently defined in that column.

    This is neat but if I create a table with 10 columns, that's work. Especially if I need to reload data in that table each time I use it, 10 times an hour. (i.e. 100 x double click would definitively kill me!)

    Of course, you may not need to resize all 10 columns each time, but wouldn't it be neat to have the columns width auto-adjust with the data you put in that Datasheet table?!

    I think it would be!

    The solution

  • Since I manage multiple computers and each run a PostgreSQL database system, I can see discrepancies between versions. (i.e. newer versions fix problems in older versions.)

    [toc hidden:1]
  • Yesterday I had a customer sending me emails from a different account from last time. That different account is a Yahoo! account so in general there is no problems with that.

    Yet, this one time it did not make it. One of my email filters failed. Namely, the DKIM filter. It uses the dkim library to check mail messages and make sure that they indeed originate from where they say they are from.

    It is an interesting concept. In the following figure I show the standard scenario of a hacker sending me spam and a valid domain sending me an email:

    As you can see, if I communicate with the ...

Syndicate content

Diverse Realty

Diverse Realty Team

Want a New Home?
Want to Sell Your House?

Call Alex at
+1 (916)
220 6482

Alexis Wilke, Realtor
Salesperson
Lic. # 02024063

Cory Marcus, Broker
Lic. # 01079165

     

Terms of Site Index

Find the page/content you are looking for with our index.