SEARCH KEYWORD -- Unix server security
Convert time to Unix time
Unix time is defined as the number of seconds that have elapsed since midnight Coordinated Universal Time (UTC), 1 January 1970,not counting leap seconds. It is used widely in Unix-like and many other operating systems and file formats. It is neither a linear representation of time nor a true representation of UTC. Unix time may be checked on some Unix systems by typing date +%s on the command line. Sometimes it's a bit difficult to compare times stored in different applications or systems with ...
UNIX time, Oracle DATE, conversion, timestamp 2013-01-19 09:04:17
Severe SSL 3.0 vulnerability to be released
According to The Register, another severe security vulnerability has been found in the widely used SSL v3 protocol. Until now, it's still in patch phase and the details of this vulnerability is expected to be released today. There are a few widely impacted security vulnerabilities revealed this year and they bring people's attention to the long existing security concerns. Previously, we have seen the HeartBleed issue and also the recently ShellShock issue. Both of them occur in popular libraries...
SSL,Security vulnerability, The Register 2014-10-14 22:22:39
Evolution mail configuration with Hotmail on Ubuntu
Evolution mail now is the default Email client on Ubuntu. When we configure this mail client with Hotmail. The steps should be followed. Step 1: Open Evolution mail through Applications->Internet->Evolution mail Step 2: Goto Edit->Preferences Step 3 : Click Add button or double click on the added mail account. Step 4 : On the Identity tab, fill the Hotmail account you want to use. Step 5 : On "Receiving email" Tab, ...
Ubuntu,Evolution mail,Hotmail,Configurat 2011-04-28 09:24:01
How to secure an Ubuntu Apache web server
Securing server software is not a straightforward task. Not all of our operating environments are the same, leading to a variety of potential security vulnerabilities. However, using a few basic configuration and security options, you can stay a little ahead of where you want to be. 1. Fail2ban Fail2ban is a Python-based intrusion prevention software that detects and blocks malicious IP addresses from multiple unsuccessful attempts at software logins. In other words, if someone is attempt...
Unix server security,Log,.htaccess,Cache 2011-12-27 09:25:32
A Toast to C
At Cloudmetrx, we use a lot of C. So given the recent passing of UNIX legend Dennis Ritchie, the creator of the C language, we think a toast to C is only fitting.Our extensive reliance on C is especially unusual considering the other languages in our stack – Clojure, Node.js, and other hipster platforms. We aren't predisposed to using older, "venerated" technologies simply because they're older and venerated. But when it comes to high-performant computation, there's just nothing like C. S...
C,Toast,C Language,Unix,Dennis ritchie,popularity 2011-10-24 11:21:32
Carriage return and line feed
In programming and document editing, we may frequently encounter carriage return and line feed, i.e the well known CRLF. But do you know about the history and difference of carriage return and line feed? Before computer came out, there was a type of teleprinter called Teletype Model 33. It can print 10 characters each second. But there is one problem with this, after finishing printing each line, it will take 0.2 second to move to next line, which is time of printing 2 characters. If a new...
CR,CARRIAGE RETURN,LINE FEED,LF,NEW LINE,CRLF 2017-02-19 08:29:23
HTTP Server development resource summary
This article summarizes some materials, articles and books I used when learning HTTP Server development. Hope this will help you. RFC and standard documents RFC2616 – Hypertext Transfer Protocol — HTTP/1.1 HTTP protocol standard document, it's an essential reference document for all personnel engaged in the development of the HTTP-related projects, careful study is recommended. RFC793 – TRANSMISSION CONTROL PROTOCOL TCP Protocol standard document The WWW Common Gateway Interfac...
HTTP Server,Book,Article 2012-09-25 22:46:56
Easy Parallel Processing in PHP
The proliferation of multicore CPUs and the inability of our learned CPU vendors to squeeze many more GHz into their designs means that often the only way to get additional performance is by writing clever parallel software. One problem we were having is that some of our batch processing jobs were taking too long to run. In order to speed the processing, we tried to split the processing file into half, and let a separate PHP process run each job. Given that we were using a dual core serv...
PHP,Parallel processing,Multithreading like,Sleep 2011-12-12 10:58:59
How Do I Enable Remote Access To MySQL Database Server?
By default remote access to MySQL database server is disabled for security reasons. However, some time you need to provide remote access to database server from home or a web server. If you want to remotely access to the database server from the web server or home, follow this quick tutorial.MySQL Remote AccessYou need type the following commands which will allow remote connections.Step # 1: Login Using SSH (if server is outside your data center)First, login over ssh to remote MySQL database ser...
MySQL,Remote access,Enable,Host or webdomain 2011-10-31 00:31:41
Leveraging Dedicated Server Hosting for Data Analytics Firms
In the age of data-driven decision making, data analytics firms require powerful and reliable computing resources to extract insights from massive data sets. A dedicated server is a type of server that is solely allocated to a single user or organization. In this article, we will explore the benefits of using a dedicated server for data analytics firms. Enhanced Performance A dedicated server offers enhanced performance that cannot be matched by other types of servers. Here are some of the benef...
HOSTING SERVICE 2023-05-12 04:18:56
RECENT
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- A journey to investigate a goroutine leakage case
- Understanding Slice Behavior in Go
- Breaking Barriers: How 3D Printing is Democratizing Product Development
- The Power of Efficiency: 10 Practical Energy-Saving Tips for Tech Startups
- more>>