My MySQL Cheat Sheet

I know, man.  No, I mean I know I could use ‘man pages’!  Or I could just ‘google it’ but then it isn’t mine.  Since I do not have time for a complete brain-dump this MySql “cheat sheet” will grow over time.  Feel free to add your favorite MySql commands in the comments, if their […]

read more

Android: A Second Career in Security?

Many of us have a wealth of decommissioned corporate-provisioned mobile devices: We’ve bought them, handed them out, and seen them used successfully for years. Now they’re on their way to the great docking station in the sky. However, because these devices are already off the books adapting them for specific security functions can mean achieving certain goals practically for free.

read more

CEO Brian Gentile: ‘Jaspersoft Has Chosen to Disrupt’

Business intelligence could be one of the most essential but little-known secrets that drives executive decisions in the marketplace. The BI market is dominated by companies that sell their proprietary business analytics solutions. Few open source companies have countered with software to overtake the traditional vendor establishment. However, open source does have its BI success stories.

read more

One in five data breaches are the result of cyberespionage, Verizon says

Even though the majority of data breaches continue to be the result of financially motivated cybercriminal attacks, cyberespionage activities are also responsible for a significant number of data theft incidents, according to a report that will be rele…

read more

Farewell, Fuduntu: The Untimely Demise of a Winning Linux Distro

Last Monday delivered both death and taxes. April 15 was not only the day U.S. taxes were due, but also the day two bombs exploded at the Boston Marathon. The magnitude of that tragedy is far beyond the scope of this column, of course, but Monday also brought a casualty — albeit on a much smaller scale — to those of us here in the Linux world. It wasn’t a human death, fortunately.

read more

Germans fine Google for gathering personal data with Street View cars

Google must pay a $190,000 fine in Germany for gathering and storing emails, photos, passwords and chat protocols from unprotected Wi-Fi networks with Google Street View cars, Hamburg’s Commissioner for Data Protection and Freedom of Information said on Monday.

read more

Putting ‘lsof’ to use

lsof is a powerful tool that has proven very userful over the years in troubleshooting and forensic investigations.  Here are some useful lsof command examples: In this example we are looking at all the files a given process has open (pid=1655 here this is the zabbix agent) lsof -p 1767 Note you can clean up […]

read more

Changing the Volume Group Name

One of the problems with cloning a system is that it has the same volume group names as the server it was cloned from.  Not a huge problem but it can limit your ability to leverage the volume group.  The fix appears easy but there is a gotcha. RedHat provides a nice utility: vgrename If […]

read more

memcached

In support of the Kuali project. Setting up true fail over for the Kuali application servers.  Currently if a node went down, the user would need to re-authenticate.  The following procedure configures the system so it can lose a node and the users on that node will not lose their session. My part on the […]

read more

Need a Great Archive Utility? Give PeaZip a Chance

PeaZip is a handy utility for reducing the size of large files and archiving different files into one big container. Unlike most file compression tools for Linux, PeaZip’s user interface makes it easy to manage. When it comes to zipping and unzipping files, simplicity counts for most everything. PeaZip is a cross platform file and archive manager available for Linux, BSD and Windows platforms.

read more