Blurring portions of an image with Photoshop is a snap. The most complicated part is figuring out which blur effect you want to use! There are a ton of choices including Blur, Blur More, Box Blur, Gaussian Blur, Lens Blur, Motion Blur, Radial Blur, Shape Blur, Smart Blur, and Surface Blur. My personal favorite for…Details
Creating multiple cacti graphs using the same script is really easy. It took me a minute to realize it but if your script input values then you can just click the “Create Graph” drop down and create multiple of any graph you have configured. See the two images below that show how to do this…Details
PostgreSQL 8.3 changed the way the Query and Index Statistics are configured from previous versions of postgreSQL including 8.2 and below. Things are technically easier now as the stats collecting is turned on by default and there are less commands to enter into the configuration to get all of the stats you will need. I…Details
I noticed this error during a deployment of numerous servers that were configured with litespeed, postgreSQL, and ruby. The installation process was to install ruby, install ruby gems, install postgreSQL, install litespeed, and then sync up the web directory using SVN. After doing so connect via a browser to the server to test things out.…Details
You might see this error when attempting to install various packages or gems on CentOS Linux. I noticed it when attempting to install the ruby gem named eventmachine. After installing one RPM package via yum I no longer received the error when attempting to install the eventmachine gem.
PostgreSQL authentication can be controlled using the pg_hba.conf file to specify what IP addresses have access to the postgres database. After making changes to this file you should never reboot the server but instead signal it to reload this configuration file. Follow the below steps to reload.
This article will assist in removing any annoying User Agent displaying for Windows Internet Explorer. You are probably curious what this is after you saw it in some web logs of some sort. It is likely from a legitimate application you have installed as some form of add-on to Internet Explorer. I did a bunch…Details
Cacti is an open source tool that polls network devices and provides a web based interface to view historical data about these devices. It is a really great tool to monitor disk usage, network traffic, and pretty much anything else you can think of. When installing cacti it is easy to forget about the log…Details
This can be done using open source software called Synergy. This application allows you to connect the keyboard and mouse to one computer which acts as a server for those devices. The setup is intended to have multiple computers connected to multiple displays but only to have one keyboard and mouse. This is not to…Details