Articles related to technology, how to use software, ways to work around technology problems, install hardware, install software, upgraded software, etc.
Although I am assuming you know what Screen is and how to use it I will quickly cover the basics just in case. Screen is a wonderful program that creates a “session” in which several “windows” exist. In each window is a shell prompt, from which commands can be executed and programs can be run.…
This may seem simple to some people but to others it is not so easy. If you installed Snort yourself you will already know where the rules file is however, these days many Linux distros come with snort pre installed with mysql configured so there is nothing to do but start Snorts IDS.
If you are using Google Analytics for web analytics it can be beneficial to exclude certain addresses to provide a more accurate view of traffic to the site. There are numerous reasons that excluding IP’s from the analytics statistics such as if it is a personal site that doesn’t do a lot of traffic and…
If you have one of the larger builds of dd-wrt then you probably have PPTP support built into the firmware. This will allow you to move VPN connections to the router instead of having to connect from each desktop which will securely make the remote network seem like part of the local network.
Have you ever downloaded a torrent only to find that it is a .daa file and not a .iso file? Even though .iso file format has become a industry standard there are still some people that insist on using the .daa format.
One of the shortcomings of Linux used to be a failure to properly support high end graphics cards. This is no longer the case with Nvidia, ATI on the other hand still has a way to go. A question I see asked a lot is how to I overclock my Nvidia card if I am…
If you use pastebin as much as I do then you will think this tool is as cool as I do. Pastebin is a online site which allows users to copy and paste snippets of code in order for share them with other people and get feed back.
One of the not so well know networking tools available on Linux is MTR. MTR combines the functionality of the traceroute and ping programs in a single net-work diagnostic tool. As mtr starts, it investigates the network connection between the host mtr runs on and a user-specified destination host. After it determines the address of…
The Conficker worm was first detected around November of 2008. Although Microsoft has long since released a patch for this vulnerability entitled MS-0687 there are still a astounding amount of computers that are getting infected with Conficker due to the MS-0687 vulnerability.