A site for solving at least some of your technical problems...
A site for solving at least some of your technical problems...
I always have to looks for the command line option to turn sites and modules on and off (really it is said to be enabled or disabled.)
The commands are as follow:
When you use one of the commands in the command line terminal without specifying which site or module to enable, then you are given a list of the sites or modules you can enable or disable. Note that the configuration files have to end with .conf for this mechanism to work as expected.
Now a day I like to install Solaris to check that my code compiles and generally runs under that OS.
I think that's a good way to prove that the code is multi-OS ready even if it is only for Unices.
OpenSolaris is free and can be downloaded from Oracle. The last URL I use was:
The system, by default, comes with a directory named /usr/sfw which includes a really old version of gcc. It is possible, though, to move forward with a newer version of the compiler by installing a package. Under Solaris 11.2, this ...
Today I wanted to upgrade some packages that had security issues. Ubuntu (like Debian) provides the apt-get tool that allows you to do upgrades the easy way:
sudo apt-get upgrade
However, that upgrades all the packages present. In some cases, you may want to skip on some packages because you know they are not ready (i.e. your own packages).
In order to only upgrade security issues, you want to get a list of packages that are to be upgraded for security issues:
apt-get -s dist-upgrade | grep "^Inst" | grep -i securi
That apt-get command line lists all the packages ready for ...
I run a few Drupal website and once per hour I run the cron.php script. I do it only once per hour because nothing changes so often on my websites so it would require faster refreshes.
Once in a while (relatively rarely now) I get a list of errors from CRON saying that the checks failed. The errors look something like this:
HTTP/1.0 302 Found Location: /cgi-bin/ipdiags.ha Pragma: no-cache Content-Type: text/html <html><meta http-equiv=Refresh content=0;url=/cgi-bin/ipdiags.ha> <body></body></html>
As you can see, this is a 302 so a temporary error. ...
It has been a while that my right Alt key acted as the Level3 key instead of a right Alt key. I never cared for the AltGr on my QUERTY keyboard, but it kept popping up as the Level3 key even though I clearly removed that option in the keyboard settings under /etc/default/keyboard
XKBMODEL="pc105" XKBLAYOUT="us" XKBVARIANT="" #XKBOPTIONS="lv3:ralt_switch" XKBOPTIONS="compose:caps"
I commented out the level3 definition and instead put "compose:caps" which makes my CAPS Lock key work as a compose key (i.e. if you press ...
As I am working on my as2js compiler, I stumble on a couple of problems with the for() loop parsing because of the in keyword. That made me think and the for() statement was actually a very funny one. Yes! You can actually write something like this and it compiles:
int zero; for(3;2;1) zero;
As you can see, all 3 entries in the for() statement are valid expressions and therefore the compiler can compile that code. This creates a loop that runs forever, similar to:
but much less clear to read, obviously.
Now that's food for thought, isn't it?
If you are using Apache and e-Commerce, you probably want to know all the details of the ciphers used by the Apache SSL module.
So listing Apache supported ciphers is done using nmap as follow:
nmap --script ssl-cert,ssl-enum-ciphers -p 443 secure.m2osw.com
This call gives you a complete list of all the ciphers currently accepted by your running version of Apache. For example, the list may look like this:
| ssl-enum-ciphers: | SSLv3: | ciphers: | TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA - strong | TLS_DHE_RSA_WITH_AES_128_CBC_SHA - strong | ...
As we are working on a new website, we had a problem where a redirect would not work. I tried both: a simple Redirect and a RedirectMatch as follow:
Redirect / http://finball.m2osw.com/ RedirectMatch permanent ^(.*)$ http://finball.m2osw.com$1
Both of these entries would not work at all.
I verified, to make sure, that the alias module was turned on. It was.
ls -l /var/apache2/mods-enabled
This did list the alias.conf and alias.load entries as expected.
So? What else?
Well... This was installed on a new server and we left the default entry in there:
ls -l ...
As I upgrade to 13.10 of Ubuntu, I'm having to do work to get my system back to normal...
Today I stumble on the fact that USB ports are now not accessible by everyone by default. So when I tried to scan a document, it told me that I had no scanner. Panic... and then I found out that the permissions were changed, widely, so only users who are root (by default) can access the scanner.
I changed the group to a group I'm in and it worked without having to reboot or relog in. However, it is not unlikely that the group won't stick... TBD!
To find the USB port that has your scanner, ...
I've been looking around every now and then to try to understand how I could create a server that replies on the correct Ethernet port.
The idea is simple, we have very powerful servers that can handle many requests, more requests that one Ethernet port can handle. In other words, we could have 2, 3, 4, probably even 10 Ethernet connections (it really depends on your application, of course: how much RAM you need, how much processing is necessary for each access, etc.)
The solution is to use the ip command line which allows us to add default gateways for each ethernet card based on the ...
Find the page/content you are looking for with our index.
SQL, or Structure Query Language, is a programming language used to manage data in a relational database system. It was made an ANSI standard in 1986.
Very Secure File Transfer Protocol Daemon, an FTP server that allows people to transfer data between computers. It is marked as very secure, at least it is as secure as an FTP server can be (although there has been several security advisories for this tool...)
Remember that an FTP transfer is rarely using an encrypted pipe (it is possible to use kerberos and SSL to really secure the data transmission) and also because it uses a data stream opened dynamically, it is possible for hackers to spoof a data connection.