- Category: Tutorials
- Created on Saturday, 29 September 2012 01:51
Link to example previewed at start of videoKing of Denmark
Link to my python version including original from developerPython-epick-score-player.zip
Link to windows exe version as well as original from developerEXE-Epick-score-player.zip
Link to developer's websitehttp://wim.vree.org/mscweb/mscweb.html
- Category: World of Warcraft
- Created on Monday, 17 September 2012 09:05
Check out this amazing World of Warcraft Arena match
Read more to see it
- Category: Computing
- Created on Monday, 17 September 2012 09:02
Ever had your laptop stolen? Thief's are always on the look out to snatch a laptop for some quick cash. Me and a friend were at a arcade and a passing by thief stole my friends laptop bag totally oblivious to the fact we both were using our laptops at the time, close call really. I have also had several people try to sell me stolen laptops, smart phones and tablets. These things are easy to quickly snatch and conceal.
There is lightweight software for modern laptops, smart phones and tablets to catch these thief's. One of which is called Prey http://preyproject.com/ and it works on Mac, Windows, Android and Linux, its free and open-source. A lot of thief's will try to use your laptop before they sell it. It is rare for these thief’s to know enough about computers to reformat your computer which gives us a chance to catch the idiot low life's who like to steal.
Prey can use your Webcam to take a photo's of the criminal and will send them to a server where you can retrieve them to hand over to the police. It can also use a laptops GPS to find where they are and can send all sorts of other information to the server, like a screenshot and what programs they are running, if you are lucky the idiot will log onto facebook and you might get a screen shot. This program will give you peace of mind if your laptop gets stolen :)
I recommend having no password or a idiot proof log on, other wise there is no chance you can get any information. Also make sure that the only device that can be booted from is the hard drive, turn off boot from CD, USB and PXE, then password protect your BIOS. This will prevent most thief's from reformatting/wiping your computer.
- Category: GNU/Linux
- Created on Friday, 07 November 2014 21:24
Installing and Configuring a Basic OpenLDAP Server
by Jacob Warren
I am creating this simple documentation because a lot of the current documentation and tutorials are obsolete/deprecated or missing steps.
I recommend the following book because it contained some of the most up to date information “Red Hat Enterprise Linux 6 Administration: Real World Skills for Red Hat Administrators” It is very helpful if you are learning Linux administration.
What is OpenLDAP
Lightweight Directory Access Protocol is a standard used for handling directory services. It is highly optimised for reading rather than writing. OpenLDAP is like Active Directory on Windows, it is commonly used to authenticate client machines but also has a lot of other uses.
Check out “Red Hat Enterprise Linux 6 Administration: Real World Skills for Red Hat Administrators” for a more in depth explanation on LDAP.