So I’m rebuilding my test lab in preparation for our rollout of Mac OS X 10.3.4 and the synchronized moving of authentication from 2 sources (Active Directory and Open Directory) to one (Active Directory). I thought my fellow co-workers would like some notes (as well as you, gentle reader) on how to accomplish the following
Continue Reading »
http://www.sente.ch/software/GPGMail/English.lproj/GPGMail.html
[WRT54G Sveasoft Flashing][1] If you have any questions or comments feel free to email me at wrt54g at cox.net [1]: http://members.cox.net/wrt54g/
So I just handed out my last invites and I log in to my Gmail and low and behold, the “Invite a friend to join Gmail!” link is there again. ![gmail screenshot][1] I’ve got 5 invites and don’t know who to give them to. So here’s the deal. Take a picture including the name “Emma” somewhere in the shot, post it somewhere, and leave a link to it in a comment on this post.
Continue Reading »
[Image theft htaccess and online aggregators from Ben Hammersley’s Dangerous Precedent][1] How about since you’re already using mod_rewrite, add a section that says, oh something like this: RewriteCond %{HTTP_USER_AGENT} !^Bloglines.* [OR] RewriteCond %{HTTP_USER_AGENT} !^NetNewsWire.* [OR] RewriteCond %{HTTP_USER_AGENT} !^AnyDesiredAggregator.* RewriteCond %[HTTP_REFERER} !http://.*benhammersly.com RewriteRule .*.(gif|GIF|jpg|JPG)$ http://benhammersly.com/images/pleasedontstealmybandwidth.gif [R,L] [1]: http://www.benhammersley.com/weblog/2004/06/20/image_theft_htaccess_and_online_aggregators.html
[Binary Bonsai][1] [1]: http://binarybonsai.com/
[Recent posts | Linux Gazette][1] [1]: http://www.linuxgazette.com/tracker/2054
Simply amazing flash animations… via mikeindustries.com/blog/ [typo_illus_01][1] [1]: http://fi5e.com/typo_illus.html
[ONLamp.com: FreeBSD Basics [Mar. 14, 2002]][1] [1]: http://www.oreillynet.com/pub/ct/15
via: <a href="http://www.cygwin.com/ml/cygwin/2003-03/msg00289.html">Robert Citek - crib sheet: ssh single-login/no password ( was Re: ssh-keygen )</a>
How to set up a no-password ssh connection from A to B, where A && B == trusted machines
Continue Reading »