Programming and Technology
It’s funny how programmers get in a "rut", using the same old coding habits and command line syntax for years on end. I just found that you can create new directories and subdirectories with a single Unix mkdir command using the -p parm. mkdir -p top_level_directory/child_directory/another_child_directory And if you’re curious, this won’t work (I tried…
Need to monitor Linux server performance? Try these built-in commands and a few add-on tools. Most Linux distributions are equipped with tons of monitoring. These tools provide metrics which can be used to get information about system activities. You can use these tools to find the possible causes of a performance problem. The commands discussed…
Netcat or nc (the command) is a networking utility for debugging and investigating a network, typically by creating and utilizing raw TCP/IP connections. Known as “The Swiss Army Knife for TCP/IP”, nc is used to read or write to network connections using TCP or UDP. It’s raw features include: Outbound or inbound connections, TCP or…
Gotta love the mysql database. Here is a list of common mysql commands and syntax that you will use most often. To login (from unix shell) use -h only if needed. # [mysql dir]/bin/mysql -h hostname -u root -p Create a database on the sql server. mysql> create database [databasename]; List all databases on the…
Running commands and shell scripts on startup/boot Do you need to run a set of commands or a shell script on CentOS / RHEL / Fedora startup? The easiest way to start a script upon boot is by adding the command to /etc/rc.local (a symbolic link to /etc/rc.d/rc.local). /etc//rc.local is a script executed after the…
The Secret in the Bible by Tony Bushby has quite a few factual errors and is more of an atheist “push my agenda” type of book rather than a historical review of the subject matter. There was one interesting aspect to the book though. It included a “puzzle” whereby each of the sixteen chapters contained a secret word that when put together in a sentence reveals ancient knowledge so secret, Bushby was not allowed to outright reveal them in his book for fear of some sort of extremely viscous retribution from someone (boy, have I got news for him).
Google policies dictate prevention of click fraud falls on the shoulders of the site owner and bans AdSense accounts for invalid clicks with practically no chance of getting that account back in good standing. Here’s how to detect and prevent invalid clicks on your sites AdSense advertisements.
I downloaded and installed the Windows 8 Consumer Preview on a VMWare virtual machine. I had a Windows 8 Technical Preview installed on the VM and the Windows 8 Consumer Preview happily installed on top of it. Installation went quite well although it took a couple of hours to complete (on a quad-core processor). Here’s a few screenshots taken during my walkthrough of the Windows 8 desktop system.
An intrusion detection system (IDS) can perform log analysis, check file integrity, monitor policy changes, and keep an eye out for rootkit installations and alert you when a threat is first suspected. The IDS that I chose for my host was OSSES HIDS, an open source host-based Intrusion Detection System offered by Trend Micro. Here’s how I installed OSSEC on my hosted Linux VPS and Splunk on a local Windows machine to monitor.
Iftt.com. It stands for (if this then that). It’s basically a “trigger”system that ties into tons of services including RSS, Dropbox, Evernote, Gmail, Youtube, Facebook, Twitter, general email, Flickr, LinkedIn, Last.fm, Read it Later (which I love), Wordpress, etc. It even has triggers for text messages, phone calls, stocks and bonds, and the weather.