Syndicate content


Solaris virtual consoles are password protected, how to remove the protection?

Solaris 11.2 (Open SunOS really) has virtual console a la Linux. This works great. You can use the Alt-F1 to Alt-F6 keys to instantly switch between 6 different consoles. I use that to have one console with an editor and another with my make and runtime tests.

Unfortunately, Solaris includes a lock which manes that each time you switch between a console, it hides the content and ask you for your password to unlock the console (that way you could have multiple users on the same computer, each using a different console and the system remains safe since people cannot just go to someone's ...

Gnome Keyring stopped working...

At some point in time, I upgraded Ubuntu and my Gnome Keyring stopped working. So each time I do ssh I have to enter the password at the prompt and that's a bit annoying after a while (depends how much I access the servers, obviously.)

I read many threads ZERO of them gave me an answer I want to hear. All of them speak of things that do not make sense in that situation. So I tried to install a brand new clean 14.04 server + ubuntu-desktop and guess what... Gnome Keyring is installed and everything makes me think that is is correctly installed (I get the correct SSH_AUTH_SOCK value) and ...

Copying a PostgreSQL database from one computer to another

When moving a database from one computer to another, you've got to copy all the data.

For PostgreSQL, there is a pair of functions named pg_dump and pg_restore.

In most cases that works great, however, some systems may create things such as additional functions that will NOT make it across. I do not know how to get that to work (and maybe it works in newer version of PostgreSQL?)

In any event, in most cases the following commands are enough (I used them with Drupal websites and since they stopped using some of the definitions they have in the system.install file used on initialization, ...

Getting Ubuntu to playback DVDs

In order to playback a DVD you need to make use of commercial encryptions (also called codecs.) Actually Ubuntu calls them "non-free". The reality is these are patented and protected so people cannot just ripoff a DVD. Which is not true at all since pretty much any computer can play DVDs and thus can copy all the data. Anyway, because Ubuntu is by default for free software, it doesn't include all the necessary DVD stuff. This being said, they provide 100% of all the necessary code, pre-compiled and all you have to do is install it all with apt-get as follow.

(You must be root to ...

Too many authentication failures for <username>

Today I tried to make use of sftp to transfer a website to Unfortunately, it kept giving me an error:

Received disconnect from <IP address>: 2: Too many authentication failures for <username>

I looked around why that would happen and could not really find anything decisive... until I found an issue in the trac system that uses. That issue mentioned the fact that the ssh-agent could be the culprit.

It was. Somehow the ssh-agent was sending key after key after key... exhausting the number of keys that will accept and thus made it

Start an Ubuntu Gnome Application as Root from your Toolbar

When you use Ubuntu X11 you at times want to start an application as Root.

In your console you'd use the sudo tool which gives the command temporary super-user powers.

sudo my-command

In Ubuntu Gnome you can do the same using the gksu command. So add an icon, enter the usual information, and for your command, add gksu in front of it. When clicked, you'll first get a prompt asking you your sudo password, then the command is executed as if the root user had started it.

gksu faxanwer ttyS0

Implementation of a secure log in via HTTP[S]

The following is a list of points one wants to follow in order to create a log in form and the necessary code in the backend.

Generate a secure Log In form (session id)

Each time you create a Log In form (or any form if that matters,) you should include a hidden session identifier in it. This will help you prevent users from posting to your server without first loading the form. This alone already prevents a large number of robots from flooding your server with totally useless POST commands1

  • 1. If you know why they do that, let me know because there is really no reason to send totally ...

Deleting a database in Synergration

Synergration AccessBooksRT is a tool we use to get a copy of QuickBooks tables in an MS-Access database.

It works great for our purpose and transformed some super sluggish forms into lightning fast forms. We still use QODBC for some of the work (updates) but 99% now goes through the database generated by Synergration instead.

Password Security

I suppose we could talk about security all day and only barely touch the tip of the iceberg, if even more than a spec of it.

Yet, I wanted to mention that in many instances, there are such limits to the characters you can use in a password that already the provider prevents you from creating a string password in the first place!

So... what is it I'm talking about?

I have one company I work with that does not support anything more than letters and digits. Not only that, they limit your password between 6 and 10 characters. Everyone knows that 6 characters is cracked very very quickly and

Syndicate content Syndicate content

Diverse Realty

Diverse Realty Team

Want a New Home?
Want to Sell Your House?

Call Alex at
+1 (916)
220 6482

Alexis Wilke, Realtor
Lic. # 02024063

Cory Marcus, Broker
Lic. # 01079165


Terms of Site Index

Find the page/content you are looking for with our index.

  • boot
  • cursor
  • embedded

    Embedded software is a reference to software written to work in a piece of hardware equipment. At first, this was code written directly for a specialized processor such as an FPGA or a DSP. Today, regular computers will be used for applications such as a medical device or a kiosk and it is also called embedded software, even though these just are desktop applications...

  • process
  • strong