So the other week I have been working on my dedicated box, just to make it a bit easier to work with in the future. One of the things I was trying to understand and learn was yum update and bash scripting. So why not combine the two? Right.. This blog entry is the result, hopefully also of some use to others. (more…)
As corny as it might sound, I had a great time meeting this girl I know online. Ok, now that we have that out of the way. Let’s explain the situation a little bit. So since early this year I’ve been a member on the social lifecasting network Justin.TV and last April I got to talk to a caster who’s real name is Angela. Last night she called me saying she’s in Amsterdam. (more…)
Bigger PHP applications, such as vBulletin can gain a lot of increased performance from running a PHP op-code cache/accelerator such as APC.
Here are some instructions on how install APC on various systems, my personal experience is with what appears the most common: 32bit CentOS 5 Server.
When dealing with data such as a video file, audio file, text document, spreadsheet and such, I have always been told to use a office solution of some kind. Something that ties things together. So when I moved away from Windows to a Mac solution I have purchased additional software solutions to replace for example Microsoft Office. I’ve also tried out a lot of open source solutions. And while there are great programs out there that do the job, I still felt like I was perhaps missing out on something. Leopard provided the solution.
In an earlier blog entry I kind of promised to come back to explaining how I try to be more secure about how I browse using FireFox. So here it is. First of all there are two different ways I do this, one is on my Powerbook (laptop) which I bring with me and therefor has a higher risk being used by others (unauthorized) or worst case scenario: it can get stolen. And my Mac Pro in my computer room which doesn’t get used much by others, and when so, only by those who I trust. Regardless, in both situation, unknown people might try to hack into the system from the outside or steal traffic via sniffing and such. Preventing abuse is impossible, making it harder to do so is possible.