Facebook targeted by hackers, says no user data compromised

Facebook said Friday it had been the target of a sophisticated hacking attack but that it had no evidence any user data had been compromised.

read more

HTTP to HTTPS

If you want to force all of your site traffic to use HTTPS or a specific part of your website, here is how to do it: Whole SIte : RewriteEngine On # This will enable the Rewrite capabilities RewriteCond %{HTTPS} !=on # This checks to make sure the connection is not already HTTPS RewriteRule ^/?(.*) […]

read more

Microsoft’s Dell Play: Smart Save or Nokia 2.0?

It’s no secret that partnerships involving Microsoft tend to make Linux bloggers nervous, and given the lessons of history, it’s not exactly any wonder, either. So FOSS fans will have to be excused for the anxiety with which they’ve watched the latest developments with Dell. CEO and founder Michael Dell is attempting to take the company private through a leveraged buyout.

read more

Obama executive order redefines critical infrastructure

President Barack Obama’s cybersecurity executive order, signed on Tuesday, could significantly expand the list of companies categorized as part of U.S. critical infrastructure sector, security experts said Wednesday.

read more

Splunk Installation

Fairly short and sweet to get the agent installed; details are below. 1)      Install the appropriate package from a designated and trusted source: 2)     The default installation path, ${INSTALL_PATH} = /opt/splunkforwarder 3)      Next, create a file with the path /opt/splunkforwarder/etc/system/local/deploymentclient.conf with the contents: [deployment-client] [target-broker:deploymentServer] targetUri = splunkdeploy.uits.uconn.edu:8089 4)      Run the following (supplying your own […]

read more

ZE Rescue Disk Fixes GRUB Bugs

The ZE Rescue Disk is a very handy rescue tool to fix damaged or missing hard drive sectors that prevent a computer from booting into its operating system. It runs automatically as a boot-repair rescue tool at startup from the optical drive. ZE Rescue Disk provides what was a missing link in permanently recovering from failed boot sequences.

read more

The Power of Google Searching

The Google Search engine is arguably the most powerful search engine.  But like any tool its power resides in knowing how to use the tool correctly.  Very few people know how to use these tools to refine their searches and get more accurate information.  Often this is referred to as data-mining. If you want to […]

read more

This Wink Doesn’t Come With a Smile

Wink, a software package for creating tutorial and presentation screen shots, works reasonably well when it works at all. However, getting it to run may not be worth the bother, given the better alternatives available. Wink’s premise is a good one for anyone who needs to create a show-and-explain presentation on how to do things with a computer.

read more

Cheat Sheets Allowed

Back in school Cheat Sheets were never allowed and if you got caught with one you were in big trouble!  How the world changes or our perspectives at least, today Cheat Sheets are considered part of almost any trade, here is a good cheat sheet source for computer science and programmers. http://overapi.com/ just don’t use […]

read more

Dutch man sentenced in US to 12 years in credit card scam

A 22-year-old Dutch man who sold credit card details online was sentenced to 12 years in a U.S. prison in a fraud prosecutors alleged caused more than $63 million in damages, according to the Department of Justice.

read more