Category: Programming and Technology

2

Remotely monitoring your children’s computers using iTalc

Using iTalc on your private home network, you can monitor your kid’s activities and keep an eye on what websites they are browsing, what they are doing on social networking sites like Facebook, and even watch as they read their email. There are other tools that offer similar functions such as keylogging tools and web site blockers, but iTalc is a perfect addition to your arsenal of child protection tools.

Print Friendly, PDF & Email
WordPress .htaccess Tips and Tricks 0

WordPress .htaccess Tips and Tricks

.htaccess files (or “distributed configuration files”) provide a way to make configuration changes on your Wordpress site on a per-directory basis. A .htaccess file, containing one or more configuration directives, is placed in a particular document directory on your Wordpress site, and the directives apply to that directory, and all subdirectories thereof. Using directives in .htaccess, you can block spam, secure your website, and control other website actions.

Print Friendly, PDF & Email
0

Hardening WordPress Security

Wordpress out of the box is fairly secure but there are still some pretty big holes. In addition, hosting environments and installation requirements often introduce gaping security holes in the Wordpress framework. Below are a few best practices to help secure your Wordpress framework.

Print Friendly, PDF & Email
0

Port WordPress from DreamHost to 1and1 VPS

I recently moved several WordPress blogs from DreamHost to a new 1and1 Virtual Private Server installation. Here are directions and screenshots of the move along with notes on problems that I ran across (and the resolution I found). I moved from a DreamHost shared host plan that killed scripts when memory consumption exceeded 100MB to a 1and1 VPS solution that provides 4,000MB of burst RAM.

Print Friendly, PDF & Email
Passwordless logins in Unix 0

Passwordless logins in Unix

Connecting via SSH, requires a user provide his identity to the remote machine using one of several methods. One method lets you access the remote system without entering a password at each login. Normally, when you log in to a system, you authenticate by entering your password for that system. Your password goes, as it is typed, to the remote system, which authenticates it against the /etc/passwd or /etc/shadow file. By contrast, SSH allow a “password-less” authentication method based on public-key cryptography.

Print Friendly, PDF & Email
Security and Hacking Notes 0

Security and Hacking Notes

Encryption and Authentication DESCRIPTION Privacy protection using DES (symmetric algorithm) involves the use of two secret keys. Each party must share their secret key with others. This makes this sort of encryption difficult to...

Print Friendly, PDF & Email
Oracle DBA Notes 0

Oracle DBA Notes

Useful Oracle DBMS Tips and Tricks CHECKING WORKSPACE ALLOCATION On DW’s NT box, click on the svmgr button on the toolbar. Log in as SYSTEM. Click Storage and the Tablespace tab. The percentages are...

Print Friendly, PDF & Email
Useful Unix Commands 0

Useful Unix Commands

Useful Unix commands To search text in files and all subdirectories find [directory] -name [files] | xargs grep [text to search for] Example to find “insert” in the odb directory (search all files in...

Print Friendly, PDF & Email