An intrusion detection system (IDS) can perform log analysis, check file integrity, monitor policy changes, and keep an eye out for rootkit installations and alert you when a threat is first suspected. The IDS that I chose for my host was OSSES HIDS, an open source host-based Intrusion Detection System offered by Trend Micro. Here’s how I installed OSSEC on my hosted Linux VPS and Splunk on a local Windows machine to monitor.
Category: Programming and Technology
Iftt.com. It stands for (if this then that). Itâ€™s basically a â€œtriggerâ€system that ties into tons of services including RSS, Dropbox, Evernote, Gmail, Youtube, Facebook, Twitter, general email, Flickr, LinkedIn, Last.fm, Read it Later (which I love), Wordpress, etc. It even has triggers for text messages, phone calls, stocks and bonds, and the weather.
Making the equivalent of mistakenly hitting the reply all button, Google Engineer Steve Yegge posted a very well written rant on the importance of architectural planning and the importance of building products around a platform. The neat thing about his post is that he is almost â€œspot onâ€ with his logic. Long post but well worth reading.
He works on a large scale in public and residential areas and his paintings can be seen all over the world from New Zealand to Hawaii – with many telling a story of the area where they are positioned. Pugh is used to people’s amazed reactions when they pass his murals. He said: ‘They say “wow did you see that. I thought that was real.” ‘Public art can link people together and stimulate a sense of pride within the community. ‘These life-size illusions allow me to communicate with a very large audience.
A Dutch man built this and posted it on tweakers.net (a Dutch website but translates to English pretty good using Google Chrome). He took a gaming computer system that he had and rather than change out the case, built a desk around it. He mocked up the design using Google Sketch, had his friend weld the aluminum frame and desk, installed thick glass as the desk top, and assembled the computer hardware into the desk frame. I believe the cooling system is in the drawer section to the right.
Recently Google hosted a thread on Reddit where they answered questions from the general public. The question of Internet connection speed at Googleplex came up. To put things in perspective, the average connection in European countries is 12 Mb/s and 10 Mb/s in the United States. Personally, my connection with U-Verse is a blazing, or so I thought, 25 Mb/s. Googleâ€™s pipe is a mind blowing 523 Mb/s!
Silicon wafers used in computer chipsets (processors) have typically been two dimensional. On May 4, 2011, Intel announced a 3-D transistor technology, called Tri-Gate, that ensures Mooreâ€™s Law, which predicts that chipset transistor density doubles every two years, keeps pace. Dense chipsets allow Intel to pack more computer cycles (with less power usage) onto a single chip. By building above the chipâ€™s surface, Intel can build chipsets that are smaller, faster, and use less power. The Tri-Gate transistors will be used in a line of 22 nanometer processors (code named Ivy Bridge) and ready for production use by 2012.
The ASP.Net ListView control is a godsend for developers. Drop the control on the form, hook in a datasource, and you have complete, out-of-the-box view, edit, insert, and delete functionality. One thing missing though is a delete confirmation if the user clicks the delete button. The Delete button is right next to the Edit button so itâ€™s fairly easy to mistakenly click it and with an accidental click, the record is permanently deleted with no prompt or warning issued to the user.
My firewall caught some odd injection attempts which lead to research on the intent of the hackers. Turns out it was an attempt to gain Shell access via Local File Inclusion vulnerabilities and injection of malicious code in proc/self/environ. Research lead to the following step-by-step instructions on what was being attempted (listed below).