**UPDATE: New article here. Its a little more complicated to create a read only database user with PostgreSQL than say using something like MySQL. You will need to grant select access on each table in the database for the read only user. Keep in mind that each time you add a new table you will…Details
A client of mine had a Cisco 2811 installed before I started working for them so I had to go over the configuration to become familiar with things. One of the Cisco IOS configuration items used was translation-rule which will allow 10 to 15 Rules to be created under each translation-rule. In this scenario they…Details
I had a customer call me after setting her up with the Thunderbird Email client and ask me a question I did not know the answer to. She wanted to enable spell check on her Email so that it would go through the whole email and check it for spelling errors after the sent button…Details
I recently reinstalled Windows XP Professional on a Dell D420 that has a biometric fingerprint scanner which is utilized by Wave Systems Embassy Security Suite with the Dell Trusted Platform Module(TPM). I thought I had it working properly after the reinstall but I kept running into errors so I attempted to follow the documentation to…Details
Insight Communications offers phone service over their cable broadband modems. Many of the phone features are exactly like other phone service such as call forwarding. To enable call forwarding on a Insight Communications digital phone follow the directions below.
You may have heard of the Tor network which if affectionately known as the onion router. Tor is a anonymity software which is free and open source. The trouble with Tor is that it can be dreadfully slow for every day use. Moxie Marlinspike has come up with a solution called Tor tunnel. Tor tunnel…Details
Although I am assuming you know what Screen is and how to use it I will quickly cover the basics just in case. Screen is a wonderful program that creates a “session” in which several “windows” exist. In each window is a shell prompt, from which commands can be executed and programs can be run.…Details
This may seem simple to some people but to others it is not so easy. If you installed Snort yourself you will already know where the rules file is however, these days many Linux distros come with snort pre installed with mysql configured so there is nothing to do but start Snorts IDS.
If you are using Google Analytics for web analytics it can be beneficial to exclude certain addresses to provide a more accurate view of traffic to the site. There are numerous reasons that excluding IP’s from the analytics statistics such as if it is a personal site that doesn’t do a lot of traffic and…Details