If you work on several Unix servers you may need to keep in sync your shell profile (bashrc, kshrc, zshrc, .profile, etc).
When available on the servers, you can use Rync, or if your servers are directly connected to Internet, you can use a CVS system (bazaar, git, cvs, svn) and store your user settings, for example, on github (Using Git and Github to Manage Your Dotfiles by Smalley Creative Blog). Obviously you can also develop a script or a software that does something similar.A nifty alternative, sync your bashrc with ssh
When you don’t want or you cannot use one of the above methods, an alternative is to use an awesome functionality of OpenSSH.
OpenSSH allow you to set a local command to be executed every time you successfully connect to a remote host.
We can use this functionality to just execute an scp of our .bashrc on each server we connect to.$ cat .ssh/config Host *PermitLocalCommand yesLocalCommand scp -q %d/.bashrc %h:
In this example we set for all the ssh connection (Host *) that we allow ssh to execute local commands (PermitLocalCommand yes). The command is specified in the More >
Today it’s finally snowing!
To disable pc-systemupdatertray (the PC-BSD system update applet) it’s enough to execute the following command as root
pbreg set /PC-BSD/SystemUpdater/runAtStartup false
Staying absolutely safe on the Internet is nearly impossible. However, there are certain tools and software to help achieve at least a comfortable amount of anonymity and privacy.
xxxterm is a minimalist web browser with sophisticated security features built-in rather than through an add-on.
In addition to providing a familiar mouse-based interface like other web browsers, it offers a set of vi-like keyboard commands for users who prefer to keep their hands on the home row of their keyboard.
The default settings provide a secure environment. With simple keyboard commands, the user can “whitelist” specific sites, allowing cookies and scripts from those sites.
It is ISC licensed.Tor – The Onion router
Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.Polipo – a caching web proxy
Questo articolo è in draft, ma verrà rilasciato in versione definitiva molto presto
Con un qualsiasi Android disponibile sul mercato, dovrebbe essere possibile installare i seguenti temi e applicazioni per ottenere la stessa interfaccia che vedete qui sopra.
In realtà, essendo un Bastian Contrario di prima categoria, mi sono spinto molto più in là e conto di andare ben oltre.Possiamo fare meglio?
Si, esorcizzare, liberare, migliorare, ma sopratuttare riconquistare il potere sul proprio smart phone.Perché?
Quando ho comprato il mio HTC Desire (code name Bravo), mi sono subito reso conto che non era veramente mio, ma del mio operatore (che non cito per NON fargli pubblicità) e che difficilmente avrebbe reso disponibili gli aggiornamenti di Android ad un ritmo accettabile.
Un sistema non aggiornato è un sistema non solo obsoleto, ma anche esposto ad attacchi di cracker senza scrupoli o di ragazzacci perditempo.
Secondo me e secondo qualche milione di altri Bastian Contrari, quando compro qualcosa, deve essere di mia proprietà e mia soltanto, questo sembra un concetto ovvio, ma per esempio, quando compriamo un computer o uno smart phone come un Android, qualcun altro decide al nostro posto cosa installarvi More >
sort -n -t . -k 1,1 -k 2,2 -k 3,3 -k 4,4
-n, –numeric-sort compare according to string numerical value
-t, –field-separator=SEP use SEP instead of non-blank to blank transition
-k, –key=POS1[,POS2] start a key at POS1 (origin 1), end it at POS2
If you like a well written explanation of this, I invite you to read this article by Paul Heinlein.
Partially taken from http://www.tomax7.com/mcse/neteworking2005.htm TCP/IP
Internet Protocol and the Transmission Control Protocol.
IP address is a 32-bit logical number to address a network device. IP are normally represented by decimal numbers, but could be useful sometimes to represent them in binary.
10101100.00010011.01011000.01001001 172. 19. 88. 73
An IP address is divided in 4 parts (each 8 bits), these parts are called octets. In the IPV4 there are 5 address classes:
Class A from 1 to 126, in binary the octet start with 0xxx 127 Reserved for loopback, 01111111 Class B from 128 to 191, in binary the octet start with 10xx Class C from 192 to 223, in binary the octet start with 110x Class D from 224 to 239, in binary the octet start with 1110 Don’t use. Reserved for the future. Class E from 240 to 254, in binary the octet start with 1111 IANA reserved 4 address ranges to be used in private networks, these addresses won’t appear on the Internet avoiding IP address conflicts. 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16 that means: - 10.0.0.0 through 10.255.255.255 - 172.16.0.0 through 172.31.255.255 - 192.168.0.0 through 192.168.255.255 - 169.254.0.1 through 169.254.255.254 (reserved for Automatic Private IP Addressing) The meaning of 8,12 and 16 is
8 = 255.0.0.0 12 = 255.240.0.0 16 = 255.255.0.0
These are subnet mask.
A subnet mask is used to determine More >
Today is a great day, 3 weeks ago, almost all of the TWiki developers started a fork of the project because they were disagreeing Peter Thoeny (TWiki founder and project leader) strategies and initiatives.
The heir of TWiki As of October 27th 2008, ‘TWiki’ is no longer the same – it is now commercial open source.The people that drove TWiki development for the past decade feel the time has come to do so under a different name.
I was an addicted, satisfied and active TWiki user since the September 4th 2006, installing, upgrading and using it for an enterprise I’m working for.
But things change, wrong founder strategies and politics convinced most of all the community members to leave the project and to found a new one.Of course, for obvious reasons, I support the Foswiki community
Let’s see the main reasons of the fork (from the Foswiki site):
In January 2008 Peter thoeny attempted to release TWiki 4.2.0 with a press release that suggested that TWIKI.NET were responsible for the release. This was withdrawn after community protests, and a request for clarification of the governance model added to the agenda for the summit.
Some notes to use Veritas Volume Manager on SolarisView configuration:
List disks: vxdisk list vxdisk -o alldgs list (shows deported disks)
Replace a failed drive:
vxprint to see which disk is failed. Take note of disk media (dm) and disk group (dg) name.vxdiskadm to remove (item 4) the failed disk. If there are not hot spare disks answer “none”
Replace phisically the disk.
vxdiskadd to initialize (just initialize) the disk. Say “not” (n) to default disk name, make it as spare disk and to encapsulate it. Don’t set the media disk name but just exit. The new disk is now initialized.
vxdiskadm to substitute the failed/removed disk (option 5).
- Enter the media disk name.
- The access name (like c#t#d#s#).