Jump to content

mudmanc4

Moderators
  • Posts

    14,887
  • Joined

  • Last visited

  • Days Won

    232
  • Speed Test

    My Results

Everything posted by mudmanc4

  1. I have dozens of databases one for every different application other then in a couple cases two for a single app, I have always created a new user for each database , assuming that if (a) or one database was compromised , then if using the old brute force this would have to be repeated for each database. It's getting to the point of monotony when backing them up, although I have been using navicat for a couple years to administer them, when I have to do something quick in terminal accessing the sql server and remembering each is now a futile task. What do you do ?
  2. I'll be interested in seeing what the other card(s) do for it as well. Is there a gb card in there now ?
  3. I was supposed to go a couple years ago to see family in AZ, just headed different direction, eventually we'll go , maybe this next summer.
  4. Nope I agree . They do put together a nice system as far as compatibility and longevity is concerned.
  5. Let me suggest that the modem be left powered on , not restarted or tweaked in any way , for at least 3-5 days. It used to be the standard time period for allowing for synchronization. If this is changed , it's been some time since I personally used a DSL connection.
  6. Interestingly enough , if you look on the home testing page , and have a peek down a little , you'll see there is now a server in Washington D.C. , afaik there's more to come as well.
  7. Shouldn't have you limited prior to your boot file. How long has it been since the new provisioning ? And how many times have you either reset or cycled the power on the modem after the provisioning ? Remembering that maxing the upload will subtract the total available amount of download bandwidth by x1 +/- any overhead they may have in line. Gaming online will show this outright.
  8. Yea thats interesting . What should you be getting ?
  9. Yes , then came the acronyms lol
  10. pfsense 2.0 running on MSI K7-n2delta AMD 3200+ 2 gigs ddr2 for the router. It all gets wild after that but main switching is handled by a Cisco 2900-XL-EN
  11. Right , at the same time , if MS pulls this off , my thoughts are the major manufacturers of motherboard components won't be making any distinction between who is going to use what , when they start scribing the die for the chips. Anything purchased may very well have this technology. And yes , people will still find ways around things. Look at it this way, take Tdawnaz for instance , she is a relatively new use of ubuntu, for reasons her and her son may have. There business right ? Now imaging this getting in where no matter what , you are forced to use microsoft software and or microsoft signed code. Is Tdawn going to go through what it takes to implement the hacks , and take the chance of losing her digital media in the meantime because of it or is she just going to say , I'll just use the one here [place any link here that is MS certified] and be done with it ? Using Tdawn may not be the best example for various reasons, but as a rule , overall , it's difficult enough to even educate someone enough to understand they have other choices besides microsoft. So overall , free open source software is going to suffer tremendously for many years to come if this gets through and is implemented in unscrupulous ways. So people like you and me as well as so many others , that develop good code however small or large it might be , and give it to the world to better there experience and empower the freedom from costly and overbearing empires, will be shuffled even further under the cover of the imperialistic idealism's of some of the companies out there.
  12. Sure , but if you read as deep as possible in this thing ( which is not gone through as of yet afaik ) there purpose is security , so that unsigned MS code is not used . But what they could do with this very simply is not cool. Rumors are just that , yet the talk on the other side is getting Intel ect to embed this code into chipsets, and or the UEFI. Not cool at all. The mere idea of it is astonishingly emblematic of past monopoly issues Microsoft has gone through , but trumps these by far.
  13. Stand up for your freedom to install free software The following is a public statement, open for signing. For more background, please read our more detailed explanation of the issue at http://fsf.org/campa...restricted-boot. Microsoft has announced that if computer makers wish to distribute machines with the Windows 8 compatibility logo, they will have to implement a measure called "Secure Boot." However, it is currently up for grabs whether this technology will live up to its name, or will instead earn the name Restricted Boot. When done correctly, "Secure Boot" is designed to protect against malware by preventing computers from loading unauthorized binary programs when booting. In practice, this means that computers implementing it won't boot unauthorized operating systems -- including initially authorized systems that have been modified without being re-approved. This could be a feature deserving of the name, as long as the user is able to authorize the programs she wants to use, so she can run free software written and modified by herself or people she trusts. However, we are concerned that Microsoft and hardware manufacturers will implement these boot restrictions in a way that will prevent users from booting anything other than Windows. In this case, we are better off calling the technology Restricted Boot, since such a requirement would be a disastrous restriction on computer users and not a security feature at all.Source This should be considered a joke ! Microsoft is seriously pushing the boundaries of monarchy. For one , what would any other reason so much attention be going to this if MS did not have unscrupulous measures in mind when they attempt something such as this. Forcing all manufacturers to use there logo is just horrendous , let alone the possibilities as to hat they may do with the manufacturers they use ie: Intel , and other major brands. Pay close attention to this , and if you care what so ever about being able to have a free and open market for hardware , and or software , you might do well for future generations to spread this as far as the Earth is a planet.
  14. The things that enamor us , later in life are simple tasks done on the side
  15. Thanks , been there done that, I get " scp: illegal option -- 0 " , which can mean any number from a plethora of other issues. I'm certain there is a simple solution, Iv'e just got to apply myself mentally a little to this one and have a search.
  16. Makes sense to use credit in some circumstances. If it works for you then I say have at it ! My only real issue with Dell is future issues with proprietary structure of the tower. Unless they've changed and parts are now interchangeable. So many times people have brought me a Dell with a mainboard problem , and it has to be one from Dell because they have the dam things made backwards. Sound strange ? The ports are all on the opposite side as anything you'll get aftermarket or Intel of the same or close to the same # board. Not to forget about the power supply , you get it from Dell or you get another case. Other hen that , Iv'e got one here we grabbed almost 7 years ago now, still crankin away , with a few upgraded from then of course. And another Dell I use as a local file server thats nearly 7 years old I inherited still churning away as it was new. And for an i7 either way , nice buy !
  17. I always change the ssh port on remote machines for obvious reasons, however it's causing an simple issue I hope someone can help with. Setting up a local server with rsnapshot using a cron and ssh keys, I need to change the command for ssh port remote access to upload the key. I just need the proper placement. I'm used to using -p to gain access , but not used it to upload a key until now. Tried " scp .ssh/is_rsa.pub -p xxxx [email protected]:.ssh/authorized_keys2 " " scp -p xxxx .ssh/id_rsa.pub [email protected]:.ssh/authorized_keys2 "[/code] I'll keep looking and post back when I get it is no one comes forward thanks
  18. At first thought a local database of results might be more like it. Maybe someone else has an idea
  19. Sure it should have been higher , thats if your running on anything much faster then dial up or slow satellite. The small test file size doesn't' allow for the OS tuning components of your network to even get complete readings to adjust before the connections terminated. The faster your connection is , the larger the test file size will have to be to get an accurate reading. I'm certain there's more to it then just that .
  20. I'de like to see how that would be coded , as your pinging from localhost or the local machine to the remote IP , so the results can only be shown locally. I'm sure there's a way , then again at the same time , you would be borking the results with the database query and the remote access.
  21. Thats site hasn't been updated in a very long time. A time when most people were still on dial up it would appear. The test file isn't large enough to test most other connections.
  22. Will rsync work on images as well ( too lazy to google )
×
×
  • Create New...