WordPress has a slight reputation when it comes to spam since the file '/WordPress/wp-comments-post.php' often get's exploited allowing spammers to automate posting to WordPress Blogs. The mess usually costs huge amounts of time to clean up just to go through all the unsolicited junk mail/bogus posts generated.
Read the rest of this entry »
December 29th, 2007 | Posted in Assorted Nuts | 1 Comment
INTRO
Printing, can become one of those nagging things if you don't have it going yet. This is especially true on Linux. Though it's 2009 at this time, Linux is still lagging in printer support though that margin between Linux and Windows is shrinking rapidly.
Having been already logged into my Linux partition I thought I should be able to setup a printer again without too many problems now that I took my system and upgraded from FC1 to Fedora 10+ (using steps you can find on this blog. Search: upgrade) and it should have the latest support for everything + the kitchen sink. Previously, I setup my Canon PIXMA ip4000 using the below steps to print without too many issues, despite information from Canon US/Canada that NO drivers are available for my printer on Linux. As mentioned I took my Linux distro through some upgrades earlier and, in addition, my second PC where the printer is actually installed had the printer configuration changed rendering my SMB installation useless on top of the fact that the local installations were also unconfigured as well due to the upgrade.
So absolutely nothing printed and off I went trying to figure out what broke.
Read the rest of this entry »
December 29th, 2007 | Posted in NIX Posts, Windows | 2 Comments
One of the things you definitely want to take a backup of on a regular basis, especially if you are a WebAdmin/WebMaster is that of your MySQL database for things such as a forum, blog or anything else you have that may use MySQL on your site. For this you'll need telnet/ssh login to allow you the function to do this from the command line (See later on for a GUI phpMyAdmin option). To get a dump, or backup of your DB, you simply need to run the following to export the database:
Read the rest of this entry »
December 26th, 2007 | Posted in NIX Posts | No Comments
Was interested tonight how well Java (A language I know) is doing against other languages such as C# (One that I don't know). I'm also something of a Bash/Ksh and Perl buff so I was also interested in popularity indexes as well. I remembered earlier a site I had used to check for this. I managed to locate it as just recently at:
Read the rest of this entry »
December 26th, 2007 | Posted in Assorted Nuts | No Comments
Having a dual boot system, I find that when setting one OS time correctly will corrupt the other OS's time. This has been going on for a while on my system despite numerous attempts to set the time properly. I suspect this has to do with BIOS settings but couldn't pin point the correct one when I started to look into the issue. To that end, and in the process, I managed to find some useful commands to work with to try and fix this issue on my system. Here's one for instance to synchronize your time with time from a remote server:
Read the rest of this entry »
December 26th, 2007 | Posted in NIX Posts | No Comments
PROBLEM
Occassionally, the default MTU (Maximum Transmission Value) value of a NIC card can cause you issues including being unable to view/see many internet sites or cause you issues when setting up your network, to the point where you will see communication popup errors and slowdowns.
Read the rest of this entry »
December 24th, 2007 | Posted in NIX Posts | 1 Comment
One of the more powerfull features of any Linux/Unix system are the monitoring features and capabilities of the OS. UNIX systems in general have been around for decades and in that time the tools available to users and admins alike on both systems have grown tramendously. In fact, the log files, tools and applications under UNIX / Linux allow you to really drill down into the heart of the operating system and diagnose a problem with the potential to even fix the issue yourself with the right know how or if the problem isn't really complicated. Further, the open source community has grown tramendously recently so finding support online for errors you find is no longer as difficult as it originally was. And support is no longer esoteric to developers either. 🙂
In this case we will look at all the associated Linux commands that can help you identify, debug and possibly even fix potential problems:
Read the rest of this entry »
December 24th, 2007 | Posted in NIX Posts | 1 Comment
Why couldn't high school math be as fun as this?
Read the rest of this entry »
July 30th, 2007 | Posted in Assorted Nuts | No Comments
Working remotely from various places, I needed to have access to my Linux machine at home. Unfortunately for me, my DSL IP was dynamic and at the time my ISP would change this IP several times a day. That was good for maybe only a few hours and then it would change to something completely different and there I was not being able to login remotely to my Linux box again. I knew I could find my external IP from my routers ’status’ page and started looking into ways of getting this information remotely without actually having to pay for a static IP. I knew of software I could purchase but didn’t want to go into an expensive trial and error campaign with software that eventually might not have something I really needed. Additionally, as you may find out or already know, having a static IP has some disadvantages when it comes to security and tracability. Simplicity at no cost is what I wanted: ssh.
Read the rest of this entry »
July 5th, 2007 | Posted in NIX Posts | 2 Comments
Most linux distros come shipped with basic firewall software. Other then ipchains or ipfwadm probably the most common command line firewall just might be iptables. If you run a small home network and need a bit more security on your box then what comes already available or a router already ships with, iptables is something you’ll want to run. What you put in the firewall will depend on what services you need running on your Linux box and which outside networks or devices will be able to access them. A general rule I follow is to block everything except what my applications need. For example, I’ll block everything with a single line then slowly unblock absolutely necessary traffic such as MSN, Email ports, internal server service communication etc. This guarantees me taht I won’t absolutely overlook a security hole. If I take the opposite approach, by blocking only what ‘know’ at the time is dangerous, then the only way to know if you have trouble is if it occurs to you. So the latter is probably not the best approach.
Read the rest of this entry »
July 5th, 2007 | Posted in NIX Posts | 3 Comments