MoonPoint Support Logo

 


Shop Amazon Warehouse Deals - Deep Discounts on Open-box and Used ProductsAmazon Warehouse Deals



Advanced Search
December
Sun Mon Tue Wed Thu Fri Sat
         
18 19 20 21 22 23
24 25 26 27 28 29 30
31            
2017
Months
Dec


Tue, Dec 12, 2017 11:25 pm

NetworkManager and nm-tool

If you wish to check the speed of network interfaces on a CentOS Linux system, if the nm-tool utility, is installed, then you can use it to determine the speed of the network ports.

$ nm-tool

NetworkManager Tool

State: disconnected

- Device: em1 ------------------------------------------------------------------
  Type:              Wired
  Driver:            bnx2
  State:             unmanaged
  Default:           no
  HW Address:        D4:AE:52:CD:0A:D4

  Capabilities:
    Carrier Detect:  yes
    Speed:           1000 Mb/s

  Wired Properties
    Carrier:         on


- Device: em2 ------------------------------------------------------------------
  Type:              Wired
  Driver:            bnx2
  State:             unmanaged
  Default:           no
  HW Address:        D4:AE:52:CD:0A:D5

  Capabilities:
    Carrier Detect:  yes

  Wired Properties
    Carrier:         off


$

If it is installed, the nm-tool program will likely be in /usr/bin . It is part of the NetworkManager package.

[ More Info ]

[/os/unix/linux/centos] permanent link

Sun, Dec 10, 2017 7:39 pm

Determining the version of CentOS on a system

If you are logged into a CentOS Linux system, there are a few ways you can determine the version of CentOS running on the system from a command-line interface (CLI), i.e., a shell prompt.

In the /etc directory, there should be a /etc/centos-release file containing information on the version of CentOS.

$ ls -l /etc/*elease
-rw-r--r--  1 root root  27 Mar 28  2017 /etc/centos-release
-rw-r--r--. 1 root root 152 Nov 25  2013 /etc/lsb-release
lrwxrwxrwx  1 root root  14 Apr 20  2017 /etc/redhat-release -> centos-release
lrwxrwxrwx  1 root root  14 Apr 20  2017 /etc/system-release -> centos-release
$ cat /etc/*elease
CentOS release 6.9 (Final)
LSB_VERSION=base-4.0-amd64:base-4.0-noarch:core-4.0-amd64:core-4.0-noarch:graphi
cs-4.0-amd64:graphics-4.0-noarch:printing-4.0-amd64:printing-4.0-noarch
CentOS release 6.9 (Final)
CentOS release 6.9 (Final)
$

To just see the version number, you can use one of the grep commands below.

$ grep -oE '[0-9]+\.[0-9]+' /etc/redhat-release
6.9
$ grep -oE '[0-9]+\.[0-9]+' /etc/centos-release
6.9
$

[ More Info ]

[/os/unix/linux/centos] permanent link

Tue, Dec 05, 2017 10:53 pm

Determining if a site has implemented HTTP Strict Transport Security (HSTS)

HTTP Strict Transport Security (HSTS) is a security mechanism used by some websites to ensure that HTTP Secure (HTTPS) is always used by visitors to the site even should some intermediate system between the visitor's browser and the website attempt a man-in-the-middle (MITM) attack to downgrade the communications protocol to the unencrypted Hypertext Transfer Protocol (HTTP). The HSTS specification was published as Request for Comments (RFC) 6797 on November 19, 2012. You can tell whether a site has implemented HSTS by establishing a telnet connection to port 80, the well-known port for HTTP connections. E.g.:

$ telnet graa.gsfc.nasa.gov 80
Trying 129.164.141.50...
Connected to gewa.gsfc.nasa.gov.
Escape character is '^]'.
HEAD / HTTP/1.1
HOST: example.com

HTTP/1.1 301 Moved Permanently
Date: Wed, 06 Dec 2017 02:56:57 GMT
Server: Apache
X-Frame-Options: SAMEORIGIN
Strict-Transport-Security: max-age=31536000; includeSubDomains
Location: https://example.com/
Connection: close
Content-Type: text/html; charset=iso-8859-1

Connection closed by foreign host.
$

[ More Info ]

[/network/web] permanent link

Tue, Nov 28, 2017 11:19 pm

Find entries in one table but not a second table in a database

I have an SQLite database stored on my MacBook Pro laptop that I use to track work requests. The database file is named CRQ.db, since it tracks work done under a Change Request (CRQ). Within that database are several tables two of which are "Equipment" and "Device". For every CRQ that I need to deal with, I store records with the CRQ number in a "CRQ" column and an identifier for each piece of equipment affected by work done under that CRQ in a "Device" column. information on equipment that is affected by the CRQ in the Equipment table. I have another table named "Device" that holds details for each device, including the manufacturer and model number as well as the physical location of the device. The information in the "Description" column in the "Device" table matches the "Device" name in the "Equipment" table. The two tables have the following structure:

Equipment
NameType
CRQText
DeviceText
ProjectText
NotesText
Device
NameType
DescriptionText Unique
ManufacturerText
ModelText
SiteText
BuildingText
RoomText
NotesText

Equipment.Device = Device.Description

[ More Info ]

[/software/database/sql] permanent link

Tue, Nov 21, 2017 11:40 pm

Changing a MI424WR-GEN2 Router from WEP to WPA2 for Wi-Fi

Someone reported to me that when she attempted to connect to the WiFi service at her office that she received the message below on her phone:

Weak Security

WEP is not considered secure.

If this is your Wi-Fi network, configure the router to use WPA2 Personal (AES) security type.

When I checked the Verizon-provided router providing the wireless service at her office, I found it was an ActionTec MI424WR-GEN2 router. To change the wireless security on that router from WEP to WPA2 take the following steps.

  1. Log into the router and, from the main menu, click on Wireless Settings.
  2. Click on Advanced Security Settings.
  3. From the Advanced Security Settings menu, select WPA2 (An enhanced version of WPA providing stronger security settings.
  4. At the WPA2 window, type a key, which is akin to a password, in the Pre-Shared Key field and click on the Apply button.
  5. When you click on Wireles Settings again from the top menu bar, you should then see the key you provided in the WPA2 line.

[ More Info ]

[/network/routers/actiontec/MI424WR] permanent link

Mon, Nov 20, 2017 10:22 pm

EMF image embedded in a PowerPoint file on OS X

Someone sent me a Microsoft PowerPoint presentation to review. The file I received was a .pptx file which I opened using the PowerPoint application in Microsoft Office 2016 for Mac on my MacBook Pro laptop running OS X El Capitan (10.11.6). When I viewed the presentation, I noticed one of the slides was blank. I sometimes receive Microsoft Excel workbooks which contain a worksheet that should normally contain network diagrams where the diagrams don't appear when viewed on my Mac laptop, but do appear when I open the file in Microsoft Excel on a system running the Microsoft Windows operating system. In such cases, I've found that since the .xlsx or .xlsm file format is just an XML-based container format akin to a zip file, I rename the files where the problem occurs to have a .zip rather than .xlsx or .xlsm extension, which then allows me to extract the files contained within the file - see Zipping and unzipping Excel xlsx files and Extracting embedded documents from an Excel .xlsm file. Then I use the OS X file command in a Terminal window to examine the .bin files in the xl/embeddings subdirectory that is produced when I extract the files and folders from the zip file. That utility tells me which of the .bin files represent embedded Microsoft Visio or PowerPoint files, so I can then give the Visio ones a .vsd extension rather than a .bin extension. I can then view the diagrams with the free VSD Viewer Pro application I have on the Mac. Since there are usually several .bin files in the directory, I created a Python script to determine the file type for all of the files in a directory at once.

[ More Info ]

[/software/office/powerpoint] permanent link

Fri, Nov 17, 2017 9:25 pm

Removing all lines containing a string in vi

To remove all lines containing a particular string in the vi or Vim text editors, you can use the g command to globally search for the specified string and then, by putting a "d" at the end of the command line, specify that you want all lines containing the specified string deleted. E.g., If I wanted to remove all lines containing the string "dog", I could use the following command.

:g/dog/d

That command would also remove any lines containing "dogs", "dogged", etc. If I just wanted to remove lines containing "dog", I could use :g/dog /d.

You can, of course, specify the pattern on which you wish to search using regular expressions. E.g., if I wanted to remove any lines containing either "dog" or "hog", I could use the command below.

g/[dh]og/d

By putting the leters "d" and "h" within brackets, I indicate to vi that it should remove any line that has either a "d" or an "h" followed by "og".

[ More Info ]

[/software/editors/vi] permanent link

Mon, Nov 13, 2017 11:20 pm

Limit number of records displayed in SQL output

If you have a lot of records in a table in a MySQL, MariaDB, etc. database that are returned when you use the SQL SELECT command to query for matching records, the results may scroll by so that you can't see the initially returned rows. You can limit the number of rows displayed by appending LIMIT n at the end of the command where n is the number of records you want to see at a time. E.g., if I had 100 records in a table named Sales, but wanted to page through them 10 records at a time, I could use SELECT * FROM Sales LIMIT 10; or, if I just wanted to view one field/column in the table, e.g. "Description", I could use SELECT Description FROM Sales LIMIT 10;

[/software/database/sql] permanent link

Sun, Nov 12, 2017 7:46 pm

Manually synchronizing time on a Microsoft Windows system

I noticed the time on a Microsoft Windows 7 Professional system was ahead of the actual time by 22 minutes. The system was part of a Windows domain, but the domain controller (DC) was decommissioned. I checked the Network Time Protocol (NTP) settings from a command-line interface (CLI) by opening a command prompt window with administrator level access and using the Microsoft Windows w32tm command. to check the current configuration for querying time servers.

C:\>w32tm /query /peers
#Peers: 1

Peer:
State: Pending
Time Remaining: 1441.6885058s
Mode: 0 (reserved)
Stratum: 0 (unspecified)
PeerPoll Interval: 0 (unspecified)
HostPoll Interval: 0 (unspecified)

C:\>w32tm /query /status
Leap Indicator: 3(last minute has 61 seconds)
Stratum: 0 (unspecified)
Precision: -6 (15.625ms per tick)
Root Delay: 0.0000000s
Root Dispersion: 0.0000000s
ReferenceId: 0x00000000 (unspecified)
Last Successful Sync Time: unspecified
Source: Free-running System Clock
Poll Interval: 10 (1024s)


C:>

[ More Info ]

[/network/ntp] permanent link

Sat, Nov 11, 2017 10:31 pm

Configuring a VPN connection on Windows 7

To set up a Windows 7 system to use Internet Key Exchange version 2 (IKEv2) for establishing a virtual private network (VPN) connection, take the following steps:
  1. Click on the Windows Start button at the lower, left-hand corner of the screen, or tap the Windows key on the keyboard and select Control Panel.
  2. From the Control Panel, click on Network and Internet
  3. Click on Network and Sharing Center.
  4. Click on Set up a new connection or network.
  5. Click on Connect to a workplace at the "Choose a connection option" window.
  6. At the Connect to a Workplace window, click on Use my Internet connection (VPN).
  7. At the next window you will see "Type the Internet address to connect to". Type the fully qualified domain name (FQDN) or IP address for the VPN provider, e.g., example.com, in the Internet address field. The default destination name is "VPN Connection," but you can change it if you wish to reflect the particular VPN provider, e.g., "Ajax VPN Connection". Check the check box next to "Don't connect now; just set it up so I can connect later" and then click on the Next button. Note: if you don't have a VPN service already, Hide.me offers a free VPN service you can use for testing, though it has more limited features and geographical locations than the Hide.me paid service. 1x1 px
  8. At the next window, you can provide the user name and password for the VPN account. If you don't want to have to provide those each time you establish the VPN connection, check the check box next to "Remember this password" then click on Create.
  9. When you see "The connection is ready to use," click on the Close button rather than Connect now.
  10. Then back at the Network and Sharing Center window, you can click on Connect to a Network and select the VPN connection. Or you can click on Change adapter settings which will show you the available network connections. You will need to be already connected to the Internet via a wired or wireless connection to establish a connection to the VPN. You can then double-click on the VPN connection entry in the list. You should see "WAN Miniport (IKEv2)" on that entry. If you need to make any changes to the settings, you can right-click on the relevant VPN connection and choose Properties.
  11. A window will open with fields for the user name and password for the domain. If you chose to save those values previously, you can simply click on Connect at this point to establish the VPN connection.

[ More Info ]

[/os/windows/win7] permanent link

Once You Know, You Newegg AliExpress by Alibaba.com

Shop Amazon Local - Subscribe to Deals in Your Neighborhood

Valid HTML 4.01 Transitional

Privacy Policy   Contact

Blosxom logo