security audits
http://www.rootkit.nl/projects/lynis.html
http://www.rootkit.nl/projects/lynis.html
Article Source Computer Forensics… Well what your asking is how to write over the data in a file so that it can not be recovered by people like me. I am a Forensic Computer Crime Investigator. I recover files for criminal investigations. The only way to make sure a file can not be recovered is… Leer más »
http://shakira.heroku.com/spanish
http://wakaba.c3.cx/s/web/wakaba_kareha
Wireshark_font_fix fix for the fonts
http://wiki.centos.org/TipsAndTricks/Firefox4onCentOS5 Update: the same goes to firefox 5
http://download.oracle.com/javase/1.5.0/docs/guide/vm/gc-ergonomics.html Garbage Collector Ergonomics The following changes take effect with J2SE 5.0. On server-class machines running the server VM, the garbage collector (GC) has changed from the previous serial collector (-XX:+UseSerialGC) to a parallel collector (-XX:+UseParallelGC). You can override this default by using the -XX:+UseSerialGC command-line option to the java command. On server-class machines running… Leer más »
Para respaldar los usuarios hay que copiar 3 tablas: jos_users jos_core_acl_aro jos_core_acl_groups_aro_map (assuming that jos is your prefix)
find . -type f | xargs grep textoabuscar
su yum install wget cd /tmp wget http://download.macromedia.com/pub/labs/flashplayer10/flashplayer10_2_p3_64bit_linux_111710.tar.gz tar xzvf flashplayer10_2_p3_64bit_linux_111710.tar.gz mv /tmp/libflashplayer.so /usr/lib64/mozilla/plugins/