This is a quick guide to installing PostgreSQL on a Linux based system. We need to get this up and running before we can write PHP scripts to talk to the database. We need to install PostgreSQL before we can install PHP (since we need the PostgreSQL header files). This is a little more complicated […]
Author Archives: kartook
Huge computer worm Conficker stirring to life Posted on – Thu Apr 9, 2009 4:50PM EDT SAN FRANCISCO – The dreaded Conficker computer worm is stirring. Security experts say the worm’s authors appear to be trying to build a big moneymaker, but not a cyber weapon of mass destruction as many people feared. As many […]
How Do I Restart MySQL Server? Each distribution comes with a shell script (read as service) to restart / stop / start MySQL server. First login as root user and open shell prompt (command prompt). First login as root user. Now type the following command as per your Linux distro: A) If you are using […]
Installing OpenFire on CentOS 5 Download and install the openfire rpm 3.6.3 (as of this writing). #mkdir downloads #cd downloads #wget http://www.igniterealtime.org/downloadServlet?filename=openfire/openfire-3.6.3-1.i386.rpm # rpm -ivh openfire-3.6.3-1.i386.rpm Openfire has an embedded database that you can use in case you don’t have MySQL installed, I prefer using MySQL though, I also tried using the embedded database, works […]
In this photo released by the Macomb County Sheriffs Department, James S. Green II, 35, of Macomb County’s Washington Township is shown in a booking photo in Mount Clemens, Mich., Tuesday, March 14, 2006. Green, a former security guard at General Motors Corp.’s Warren, Mich., technical center, is accused of taking employee Social Security numbers […]
The following queue works as following: star all calls are monitored, i.e. saved to disk star if after 60 seconds on the queue the call is unanswered, the call is routed to voicemail star there are two levels of agents: agents 4000 and 4001 will answer the queue (level 1); only if none of them […]
The portrayal of hackers in the media has ranged from the high-tech super-spy, as in Mission Impossible where Ethan Hunt repels from the ceiling to hack the CIA computer system and steal the “NOC list,” to the lonely anti-social teen who is simply looking for entertainment. The reality, however, is that hackers are a very […]
Army Pfc. Eric O. Jenott, shown in these undated law enforcement photos, has been charged with espionage for allegedly hacking into military computer systems and giving national defense secrets to the Chinese. (AP Photo). Submit Date 08/21/1996 23:51:00 Under questioning by an unidentified police officer, Chen Ing-hau, foregound, who allegedly created the ChernobylTaipei,Taiwan, Friday, April […]
An updated version of an old worm is targeting the same Microsoft vulnerability exploited by variants of Conficker. This time around, MS08-067 – a patched flaw in the Windows Server service – is being targeted by a new variant of the Neeris worm. Neeris first appeared in 2005, but is now back on the scene […]