In Tiajuana, Mexico, there is a shakedown and purge of the police department underway due to allegations of corruption. As a result, the police have been disarmed so that their weapons can be used in ballistics tests to see if any were used in a number of murders linked to drug cartels and re-issued slingshots and ball bearings as weapons. They're crude, and definitely underpowered when compared to a pistol, but anything small and hard moving very fast is going to put a hurt on you if and when it hits.
Heads-up for the Maryland contingent: Author Christopher Penczak will be doing a couple of classes at Spark of Spirit (9937 Rhode Island Avenue; College Park, Maryland 20740; phone number301-345-1486) on 13, 14, and 15 April, 2007.
When all else fails, try doing what you know shouldn't work. I don't care if the docs say it doesn't work, if the FAQ says it doesn't work, if the books say it doesn't work.. try it anyway. Stuff like BIND is like that.
In trying to get a domain working with BIND, what I wound up doing was changing a record for a single host (www IN A xxx.xxx.xxx.xxx) to the FQDN (fully qualified domain name - www.promiseofiris.org. IN A xxx.xxx.xxx.xxx), incrementing the zone's serial number, and then kickstarting the daemon. Lo …
If you don't, you'll see error messages to the effect of "Unknown arg '--dport'" When writing Snort rules, there are a few things to keep in mind. First of all, rules come in two parts: the …
The /usr/bin/eject utility on a Linux system is a good way of figuring out which machine has what name in the KVM when you're dealing with a rack of machines, many of which are likely to be mislabelled. Use the eject utility to open the CD-ROM drive and see what machine you're really connected to; then update the labels in the KVM's configuration appropriately.
If your fibre-optic network card isn't seeing any traffic at all, try switching the plugs on the card. Some optical network cables don't have colour-coded connectors so it's easy to plug them into the …
The actions of a systems cracker trying to get a foothold in someone's network by social engineering the people in the NOC and someone hunting for a job who is trying to get hold of a human being in the HR department somewhere in a company are not that different.
When writing Perl code, generally speaking the simplest code is what will do exactly what you need. If you overthink what you're working on, you won't get anywhere.. especially with the reverse operator.
Perl gives you enough rope to not only hang yourself but your entire family, too. Don't make …
GNU Screen makes coding so much easier: Run screen to multiplex your shell, then run a text editor in one, a debugger in another, have another shell open to compile.. no more mousing between windows. There isn't much of a learning curve, if you feel comfortable coding under Unix (or using the Cygwin tools for Windows) you'll pick it up in no time.
Sleeping just enough to recoup your strength so you can go out again isn't a good thing. Sleep enough to get all your energy back. Don't pull two or three all-nighters in a row, either. It'll crush …
Just because it's usually the one-half teaspoon that falls off the holder and it's usually the one-half teaspoon that fell off the holder that you grabbed out of the drawer doesnt't mean that it's the one-half teaspoon that you really grabbed. Always look before you use measuring implements.
When a recipe says to use eggs, use real eggs. Four times out of five, Egg Beaters just won't cut it. When creaming butter and sugar together (probably butter and anything, I havn't tried yet) it doesn't hurt if you melt the butter in a skillet or frying pan first. If anything …
Coding with a teddy bear in your lap helps immensely.
IPtables for the v2.4 Linux kernel series doesn't understand virtual interfaces (a.k.a. IP Aliasing). If you've never seen this before you can take one interface, say eth0, and bind an IP address to it, for example 192.168.1.1. Under the v2.4 kernel series you can bind more than one IP address to an interface, which creates a virtual network interface. If I bound a second address (10.0.0.1) to our network interface above you'd see in the output of /sbin/ifconfig eth0 …