| Friday October 31st 2014

Feedburner

Subscribe by email:

We promise not to spam/sell you.


Search Amazon deals:

‘best practices’ Archives

HOWTO: Use iptables to Block Brute Force Attacks

I left a linux machine online with ssh open for a day. It dropped incoming login attempts after the username was entered. These are the usernames the "hacker(s)" tried: account adam adine adm admin admin1 admin2 administrator admissions advice ahmed airport akademik alan albert alberto alex alfred ali alias alice allan alpha alumni amanda [...]

HOWTO: Increase your available swap space with a swap file

HOWTO: Increase your available swap space with a swap file

You've finally configured every aspect of your Linux system. All of your devices function, and everything is configured just the way you like it. At least you think so, until you start running out of memory when you have heavy mathematical computations (Matlab or something) or lots of browser tabs open, with Youtube, simultaneously. You realize [...]

HOWTO: Move a WordPress blog to another domain. The complete guide and best practices

HOWTO: Move a WordPress blog to another domain. The complete guide and best practices

As you may have noticed, this site has been renamed from twinturbo.org to landofthefreeish.com. Below is how we made the transition from old to new and how to properly move a Wordpress blog without breaking image links or your precious seo backlinks. Make a backup of your database. I simply logged into Phpmyadmin and made a copy of the [...]

RAID Write Back vs Write Through

RAID Write Back vs Write Through

To suffer or not to suffer?  That is the question. RAID Features Write Through Cache With Write Through Cache the data is written to both the cache and drive once the data is retrieved. As the data is written to both places, should the information be required it can be retrieved from the cache for faster access. The downside of this method [...]

HOWTO: Write a Linux virus in five easy steps

HOWTO: Write a Linux virus in five easy steps

There is this rumor going around that Linux is virus free. It is said that the old-fashioned multi-user heritage of Linux (and other *nix OSs) prevents malware, since users are not normally running their programs in admin mode (as root user). We are reminded that execute bits are needed to run anything – contrary to Windows – and that execute [...]

Firefox Speed Tweaks

Firefox Speed Tweaks

To get started, open your Firefox web browser. In the address/location bar type about:config and then press your Enter key. Tweak #1: In the Filter bar type network.http.pipelining Then, double-click on this line under Preference Name in order to change the value from false to true. Tweak #2: In the Filter bar type [...]

NFOPad

NFOPad

If you frequently open NFO files, NFOPad is a small Windows Notepad clone designed to display them properly. NFOPad selects the font style based on the file extension, so you can freely switch between basic text files and NFO files without the hassle of changing settings. In the screenshot above, the same file has been opened in both Notepad [...]

Apparently, two spaces after a period is no longer correct… When did this happen?

Apparently, two spaces after a period is no longer correct… When did this happen?

I used to always use two (or three) spaces to take up more space on papers that need to be a certain length in pages. I guess this has changed over the years... I also heard they don't teach cursive handwriting either. ugh. Everyone who took typing class in high school learned that you always put two spaces after a period. The same goes for [...]

JournalSpace Wiped Out

JournalSpace Wiped Out

Blogging service JournalSpace has been completely wiped out after the drives that housed their entire database were overwritten. The problem was that their backups weren't actually backups at all. The servers were set up with a mirrored RAID system so that if the primary drive should fail the secondary drive would be used to recover the [...]

HOWTO: Setup Network Bonding

HOWTO: Setup Network Bonding

What is bonding? Bonding is the same as port trunking. In the following I will use the word bonding because practically we will bond interfaces as one. But still... what is bonding? Bonding allows you to aggregate multiple ports into a single group, effectively combining the bandwidth into a single connection. Bonding also allows you to [...]

Top 500 Worst Passwords

Top 500 Worst Passwords

From the moment people started using passwords, it didn’t take long to realize how many people picked the very same passwords over and over. Even the way people misspell words is consistent. In fact, people are so predictable that most hackers make use of lists of common passwords just like these. To give you some insight into how predictable [...]

HOWTO: Broadcast a message to all your linux users

Sometimes as the administrator of a Linux Operating System Server, y may need to send a message to all users in a multi-user system. There are some different ways to do this, but we will now see just one of them. We will use wall. As the main input of wall is a file, we will first create our message file. Let's say you want to tell users [...]

NotifyMeWhenItsUp Emails You When a Web Site Returns or Disappears

NotifyMeWhenItsUp Emails You When a Web Site Returns or Disappears

Web site Notify Me When It's Up performs a very simple but worthwhile task: It sends you an email when a downed site you want to visit returns to the internet. Similar to Down For Everyone or Just Me, which helps you figure out if a site you're having trouble reaching is really down or its, well, just you—Notify Me When It's Up takes the next [...]

Passwords suck

Passwords suck

Google cryptographer and all-round security expert Ben Laurie's been blogging some great security thinking lately. Today he's got a really fascinating, thoughtful piece about the problems of passwords... So, where does this leave us? Users must have passwords, so why fight it? Why not admit that its where we have to be and make it a familiar (but [...]

HOWTO: Interview a Linux machine

HOWTO: Interview a Linux machine

Just the other day, a client called upon me to perform a hardware and software inventory on all of the computers on his network. There weren't that many machines to inventory, but we needed to gather quite a bit of information about each one quickly. The client was a Microsoft shop and so I had to deal with about an even mix of Windows XP and [...]

Think of Megapixels in Terms of Cupcakes

Think of Megapixels in Terms of Cupcakes

Lifehacker has noted that cramming more and more megapixels into consumer-grade digital cameras isn't really giving everybody better pictures. These days, in fact, cameras with more than seven or eight megapixels per picture are seeing more noise and grit because too much information is passing into too small a sensor. One New York Times writer [...]

Slow linux startup? Bootchart reveals all

Slow linux startup? Bootchart reveals all

Ever wondered what takes your Linux box so long to boot up? You can see for certain with the Bootchart package. Bootchart logs the entire startup process and produces a clean, graphical representation of its results suitable for everything from troubleshooting to good old-fashioned bragging rights. Bootchart is a common utility, so check your [...]

Writing Robust Bash Shell Scripts

Here's a decent writeup on how to tweak your bash scripts to be more reliable. It goes step by step and is easy to understand even for a novice. Cheers! Many people hack together shell scripts quickly to do simple tasks, but these soon take on a life of their own. Unfortunately shell scripts are full of subtle effects which result in [...]

Richard Stallman: Keep your data at home, not in the clouds

Richard Stallman: Keep your data at home, not in the clouds

The concept of using web-based programs like Google's Gmail is "worse than stupidity", according to a leading advocate of free software. Cloud computing – where IT power is delivered over the internet as you need it, rather than drawn from a desktop computer – has gained currency in recent years. Large internet and technology [...]

Enable Self Destruct Mode on Your Windows Mobile Phone

Enable Self Destruct Mode on Your Windows Mobile Phone

Although losing your cellphone is never an enjoyable experience, it's a much worse feeling when your mobile device is carrying more than just contacts. If you're carrying things you don't want anyone else to have access to—whether it's personal information or company secrets—on your Windows Mobile device, it's a worthwhile investment [...]

 Page 2 of 3 « 1  2  3 »