public marks

PUBLIC MARKS from alamat with tag tech


Tech Travel Tip: Assume Your Devices Will Be Compromised

The international reach of the Internet may have distributed cyber threats to every corner of the world, but some countries remain more dangerous than others. Whether traveling abroad for business or pleasure, a few simple steps can help prevent your information from being stolen and your devices from being confiscated.

How Do I Scan My Linux System For Rootkits, Worms, Trojans, Etc.?

Either install the package that comes with your distribution (on Debian you would run apt-get install chkrootkit

Where do the IP addresses come from?

You used to have to set up ip addresses, netmasks, gateways, and name resolvers all manually. Refer to any basic networking text to learn more about this aspect.


Linux Tip of the Day - Variable usage i or ii

In cases like the following, you will notice a variable, $i, put into use. Variables such as “i, j, k” are commonly used not only in simple shell scripts, but all types of code.


Adding disk on Linux

Linux hard disk device names follow a specific standard. SCSI disks all start with sd and IDE disks with hd. After this comes a letter that identifies the unit number of the disk, so for example, the first disk would be a, the second would be b, the third would be c, and so on.

Apple decides to step up and defend itself

Creative Labs, makers of the Nomad and Zen line of portable MP3 players, decided to sue its biggest MP3 competitor, Apple Computers. The suit that Creative filed claims that Apple infringed on patents over the interface that's used in Apple's iPods. Creative claims that it had designed the easy to use interface over 6 years ago. Many are asking why Creative waited so long if it had the patents 6 years ago.

Download of the day: Path Finder 4.1.1

Path Finder is a file browser for Mac OS X. It has many features, including labels, customized fonts and colors, a desktop trash can, spring-loaded folders, an image converter, a preview drawer, a menu key editor, an enhanced column view, and a built-in application launcher; and the ability to view invisibles, to compress/decompress, create disk images, add and remove thumbnail icons, open the program with the menu, view hex, copy paths, secure-delete, launch as root, find files, create aliases and symbolic links, delete as root, and to open in terminal. The program was previously named SNAX.

Black is the new White?

Ever since the iPod Nano, Apple has been introducing more and more "black" versions of their products. First it spread to the iPod with Video, and just a while ago to their top line Macbooks. Many complain about the last product, due to the price you pay just for the black coating being around $100, or even more in some blogs, but I'm no price genius so I don't what reasons are behind this.

Hacking tools

To better understand—and, consequently, to better ensure—network security, it always pays to understand the tools of the attackers. Darknet lists 15 essential hacking tools:

Protecting content with .htaccess files

.htaccess files are very versatile, and can easily become very complex. This document contains enough information to set simple access restrictions/limits on a directory in your web space. Remember to upload .htaccess files, and .htpasswd files using ASCII mode. This is an option is available in most FTP clients.

Xbox 360: Feel the Power

We all know that Xbox 360™ blows the doors off today's consoles in the power department. But just how much power does Xbox 360 have, and why do developers and gamers agree that it's the system to beat? Glad you asked!

Adding Additional Hard drive on your Linux Machine

Normally one would ask? how do i add additional harddrive to my linux box.. well we could make use of utilities like fdisk, cfdisk or QtParted but it is fdisk that is im going to discuss below.

Some Unix Tips

These are some unix tips that might be helpful someday down the road. Feel free to contribute more unix tips by commenting on this article.

Monolithic kernel vs Microkernel - Which is the better OS architecture?

Anybody who reads the tech related news online would by now be aware of the fierce debate that is raging regarding the most suitable design of an operating system. On the one side are those who favor monolithic kernels - that is a kernel which take care of almost all the system tasks like interfacing between the sound card and the audio software, the graphics card drivers and so on. Linux is a perfect example of a monolithic kernel where most of these functions take place in the kernel space. And not surprisingly, Linus Torvalds is a strong proponent of monolithic kernels.

Virtual Hosting With Proftpd And MySQL (Incl. Quota)

This document describes how to install a Proftpd server that uses virtual users from a MySQL database instead of real system users. This is much more performant and allows to have thousands of ftp users on a single machine. In addition to that I will show the use of quota with this setup.

alamat's TAGS related to tag tech

apache +   apple +   billgates +   blog +   computer +   database +   devices +   distro +   download +   explorer +   firewall +   from +   game +   games +   google +   hacking +   hardware +   help +   ip +   ipod +   itunes +   java +   laptop +   linux +   mac +   microsoft +   mobile +   movies +   mysql +   networking +   news +   passwords +   programming +   quicktime +   religion +   rootkit +   security +   shell +   shop +   software +   spam +   spammers +   spyware +   sun +   system +   techy +   tip +   tips +   travel +   tricks +   trojan +   tutorial +   tv +   unix +   update +   windows +   world +   worm +   yahoo +