background preloader

Geeky

Facebook Twitter

Transistor fabrication: so simple a child can do it. Unix - sed: How can I replace a newline (\n) 500 OOPS error from vsftpd. If you find yourself with the ever-so-peculiar 500 OOPS error from vsftpd when you attempt to login over SSH, there could be a few different things at play.

500 OOPS error from vsftpd

Generally, this is the type of error you will get: You can search for a solution in this order: Home Directory Does the user’s home directory even exist? Check /etc/passwd for the current home directory for the user and see what’s set: In this case, does /var/www/someuser exist? File/Directory Permissions Be sure that the user that you are logging in as actually has permissions to be in the directory. SELINUX If SELINUX is rearing its ugly head on the server, this can be a problem. Try to login over FTP again and you should have a success. 555 and 556 Timer Circuits. Symbol | Supply | Inputs | Output | 556 Also see these 555 timer pages: Astable | Monostable | Bistable | Buffer Introduction The 8-pin 555 timer must be one of the most useful ICs ever made and it is used in many projects.

555 and 556 Timer Circuits

With just a few external components it can be used to build many circuits, not all of them involve timing! A popular version is the NE555 and this is suitable in most cases where a '555 timer' is specified. Function - Evaluating variable within R loop. Time Machine for every Unix out there - IMHO. Rsync is one of the tools that have gradually infiltrated my day to day tool-box (aside Vim and Zsh).

Time Machine for every Unix out there - IMHO

Using rsync it’s very easy to mimic Mac OS X new feature called Time Machine. In this article I’ll show how to do it, but there is still a nice GUI missing – for those who like it shiny. What Time Machine does Time Machine makes a snapshot of your files every hour. The files are usually stored on a external hard drive connected to your Mac via USB or Firewire. So if you lose a file, or did a devastating change to one of your files, simply go back in time until you find your file or a version that’s not corrupted. The Comprehensive List of Window Managers for Unix.

Three Archaic Backdoor Trojan Programs That Still Serve Great Pranks : Learn-Networking.com. There are several things that come to mind when talk of the 1990′s comes around.

Three Archaic Backdoor Trojan Programs That Still Serve Great Pranks : Learn-Networking.com

Nirvana, vodka, cheap rap, and well- global warming wasn’t the subject of every conversation. But what really outshines the rest is the world of computing. The world of security was just getting its foothold into what is now a highly evolved and much more complicated scene. Three programs in particular allowed anyone to pull of amazing feats of prowess- all without any hacking knowledge. Today these programs won’t make it past a cheap firewall. Back Orifice / Back Orifice 2000 Back Orifice, or BO, is one of the more common backdoor programs- and one of the most lethal of the bunch. Pictured above is Back Orifice Version 2000. Companies such as Symantec have taken steps in guarding computers against the program, as they have deemed it as dangerous. Back Orifice 2000 is being developed for Windows 95, Windows 98, Windows NT, Windows 2000, and Windows XP. Where Can I Download Back Orifice 2000?

1. 1. 1. Linux Book Pro. Why passwords have never been weaker—and crackers have never been stronger. In late 2010, Sean Brooks received three e-mails over a span of 30 hours warning that his accounts on LinkedIn, Battle.net, and other popular websites were at risk.

Why passwords have never been weaker—and crackers have never been stronger

He was tempted to dismiss them as hoaxes—until he noticed they included specifics that weren't typical of mass-produced phishing scams. The e-mails said that his login credentials for various Gawker websites had been exposed by hackers who rooted the sites' servers, then bragged about it online; if Brooks used the same e-mail and password for other accounts, they would be compromised too. The warnings Brooks and millions of other people received that December weren't fabrications. Within hours of anonymous hackers penetrating Gawker servers and exposing cryptographically protected passwords for 1.3 million of its users, botnets were cracking the passwords and using them to commandeer Twitter accounts and send spam.

Newer hardware and modern techniques have also helped to contribute to the rise in password cracking. The Straight Dope - Fighting Ignorance Since 1973. Time Lapse View from Space, Fly Over. Epoch Converter - Unix Timestamp Converter. The W3C Markup Validation Service. Some Advanced Papier Mache Recipes. Some Advanced Papier Mache - Papier Maché Pulp Recipes Warning: Due to some of the ingredients and techniques involved in this tutorial, this is not recommended for children without adult supervision.

Some Advanced Papier Mache Recipes

Introduction I've been making paper maché items since I was 13 years old. My Grandmother used to make bird houses and feeders that my Grandfather would laquer with the remains of a product he used for finishing car paints (he was a car mechanic). Later on in life I got fascinated by the world of puppeteering (the muppet show is still in my top 5 favourite shows) and started my first trek in the business when I was 18. One of the things that fascinates me the most is that to the contrary of many beliefs, paper mache isn't just paper and glue. Here are a few that are my most used. Finishing paper mache (porcelain finish) You will need: - 1/2 roll good quality white toilet paper- 1 tablespoon raw linseed oil Instructions:Rip, mix and apply... simple as that! A List Apart. Some Girl from Canada - Source for everything geek.