This is where I post snippets of information about Information Technology. It is mostly for my own reference but I hope that others will find it useful and comments are welcome.
Wednesday, December 22, 2010
Monday, December 20, 2010
Saturday, December 18, 2010
Butter rum recipe
Ingredients:
Mug of hot water
tab of butter
clove (whole cloves preffered)
table spoon (to taste) brown sugar
optional vanilla extract
meyer's dark rum
place butter, clove, sugar, vanilla & rum into mug.
bring the water to near boil then pour into mug and stir.
Enjoy!
Mug of hot water
tab of butter
clove (whole cloves preffered)
table spoon (to taste) brown sugar
optional vanilla extract
meyer's dark rum
place butter, clove, sugar, vanilla & rum into mug.
bring the water to near boil then pour into mug and stir.
Enjoy!
Why not store VMware vm data in DNS?
Why add yet another layer of database management to the IT work place? Store information that supports VM's in DNS ...
Mac stuff
To install MAC OS X you need the install DVD.
Place the DVD into the system.
Reboot the system and hold down the 'c' key.
The system should boot from the DVD.
Next follow on screen instructions.
Place the DVD into the system.
Reboot the system and hold down the 'c' key.
The system should boot from the DVD.
Next follow on screen instructions.
Thursday, December 09, 2010
How to see constraints in oracle database
red@red_dev> desc all_constraints;
Name Null? Type
----------------- -------- ------------
OWNER NOT NULL VARCHAR2(30)
CONSTRAINT_NAME NOT NULL VARCHAR2(30)
CONSTRAINT_TYPE NULL VARCHAR2(1)
TABLE_NAME NOT NULL VARCHAR2(30)
SEARCH_CONDITION NULL LONG
R_OWNER NULL VARCHAR2(30)
R_CONSTRAINT_NAME NULL VARCHAR2(30)
DELETE_RULE NULL VARCHAR2(9)
STATUS NULL VARCHAR2(8)
DEFERRABLE NULL VARCHAR2(14)
DEFERRED NULL VARCHAR2(9)
VALIDATED NULL VARCHAR2(13)
GENERATED NULL VARCHAR2(14)
BAD NULL VARCHAR2(3)
RELY NULL VARCHAR2(4)
LAST_CHANGE NULL DATE
INDEX_OWNER NULL VARCHAR2(30)
INDEX_NAME NULL VARCHAR2(30)
INVALID NULL VARCHAR2(7)
VIEW_RELATED NULL VARCHAR2(14)
Monday, December 06, 2010
[ProFTPD-announce] ProFTPD ftp.proftpd.org compromise
http://marc.info/?l=proftpd-announce&m=129124765606322
ProFTPD Compromise Report On Sunday, the 28th of November 2010 around 20:00 UTC the main distribution server of the ProFTPD project was compromised. The attackers most likely used an unpatched security issue in the FTP daemon to gain access to the server and used their privileges to replace the source files for ProFTPD 1.3.3c with a version which contained a backdoor. The unauthorized modification of the source code was noticed by Daniel Austin and relayed to the ProFTPD project by Jeroen Geilman on Wednesday, December 1 and fixed shortly afterwards. The fact that the server acted as the main FTP site for the ProFTPD project (ftp.proftpd.org) as well as the rsync distribution server (rsync.proftpd.org) for all ProFTPD mirror servers means that anyone who downloaded ProFTPD 1.3.3c from one of the official mirrors from 2010-11-28 to 2010-12-02 will most likely be affected by the problem. The backdoor introduced by the attackers allows unauthenticated users remote root access to systems which run the maliciously modified version of the ProFTPD daemon. Users are strongly advised to check systems running the affected code for security compromises and compile/run a known good version of the code. To verify the integrity of the source files, use the GPG signatures available on the FTP servers as well on the ProFTPD homepage at: http://www.proftpd.org/md5_pgp.html.
Subscribe to:
Posts (Atom)