By donmc, 19 June, 2009

It's worth enabling SSH in nearly every case for normal day to day remote access. This is mainly due to the inherently insecure nature of its little brother - TELNET, which is completely un-encrypted and therefore sniffable on any network.

Here's how:


R2(config)#ip domain name cisco.com
R2(config)#crypto key generate rsa
The name for the keys will be: R2.cisco.com
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.

By donmc, 18 June, 2009

http://www.yaml.de/en/home.html
"Yet Another Multi-Column Layout" - incredible JAVA CSS layout engine.

http://www.ohloh.net/p?sort=users&q=training
Ohloh - this is an interesting site that examines the open source community projects out there from many different angles. Extremely cool.

By admin, 18 June, 2009
Topic

Standard Content Elements

Heading Levels

H1 Heading

H2 Heading

H3 Heading

H4 Heading

H5 Heading
H6 Heading

Paragraphs

This is a normal paragraph text. This is a normal paragraph text. This is a normal paragraph text. This is a normal paragraph text. This is a normal paragraph text. This is a normal paragraph text. This is a normal paragraph text. This is a normal paragraph text.

By donmc, 17 June, 2009

http://www.seobook.com/
"Seo Book is different. We focus our training program on how to grow your presence. Our tagline Learn. Rank. Dominate. matches our approach to teaching SEO. "

http://htmlpurifier.org/
"HTML Purifier is a standards-compliant HTML filter library written in PHP. HTML Purifier will not only remove all malicious code (better known as XSS) with a thoroughly audited, secure yet permissive whitelist, it will also make sure your documents are standards compliant, something only achievable with a comprehensive knowledge of W3C's specifications. "

By donmc, 1 June, 2009
Topic

We've had some issues recently, so I wanted to apologise for those and tell you that they are now resolved (or so my service provider tells me...)

here is a history for the last few weeks - look what a bad cable can do to your reliability!

This report is thanks to a free website uptime monitor from www.basicstate.com

By donmc, 1 June, 2009

I have often wondered when Google would begin to develop an alternative to the windows platform - something for the rest of us...

But it is already out there in plain sight - just smuggled under the radar in the form of a "phone operating system".

Take a look at this post from Engadget - there is a video clip of a "smartbook" - an ASUS Eee PC prototype running google's "Android" on a 1GHz Snapdragon chipset. It is incredible, and the power use is so low that they didn't need to include a fan...

http://tinyurl.com/nqye48

By donmc, 26 May, 2009
Topic

Assembling a security policy can be a difficult task without guidance. The International Organization for Standardization (ISO) published a security standard called ISO/IEC 27002. This document refers to information technology related security issues and outlines a code of practice for IT security management. ISO/IEC 27002 provides a guideline for developing organizational security standards and security management practices.

By admin, 25 April, 2009

I myself use this low-level-we-need-the-command-line-for-this method:
http://linuxmint.com/forum/viewtopic.php?t=3969

Or:
Take a look here .... the backup tool they discuss there is called "hubackup" and you can install it via "Synaptic":
https://wiki.ubuntu.com/HomeUserBackup

http://ubuntuforums.org/showthread.p...89#post3795689