Technoids

Facebook Twitter
More locks for your SSH door More locks for your SSH door My first article about hardening SSH access (see Resources) considered three methods that are suitable for small operations, such as a home server or a small business with few people requiring remote SSH access: Changing SSH's standard port to an unusual value and reinforcing SSH configuration so that simple-minded attacks just bounce back.Defining a restricted list of users who are allowed to log in using Pluggable Authentication Modules (PAM).Completely hiding the fact that you even allow SSH access and requiring a special "knock" sequence to be recognized as a possible user. Using PAM to define a restricted list of users who are allowed to log in still makes sense for larger setups, but the other two options can become bothersome. Therefore, this article examines a couple methods of enhancing security that you can more easily apply to larger configurations:
What Arduino can do Arduino can sense the environment by receiving input from a variety of sensors and can affect its surroundings by controlling lights, motors, and other actuators. The microcontroller on the board is programmed using the Arduino programming language (based on Wiring) and the Arduino development environment (based on Processing). Arduino projects can be stand-alone or they can communicate with software running on a computer (e.g. Flash, Processing, MaxMSP). The boards can be built by hand or purchased preassembled; the software can be downloaded for free.

HomePage

HomePage
When good disks go bad Introduction If you have been doing IBM® AIX® systems administration or SAN administration for any length of time, you are probably intimately familiar with disk errors, file system problems, and Logical Volume Manager (LVM) failures. What should you do when one of these situations arises? When good disks go bad
La navigation Web se veut de plus en plus visuelle. C’est ce que tente de démontrer la société Pearltrees qui propose un service de « social bookmarking » vous permettant d’archiver et de classifier un nombre infini de pages web, par l’intermédiaire d’une interface graphique et ergonomique. Ce système ne présente pas vos liens favoris sous forme de liste comme Delicious mais sous forme d’arbre, de carte. On trouve ainsi deux types d’éléments sur un arbre : les perles et les pearltrees. Les pearltrees sont des dossiers dans lesquels on peut mettre d’autres pearltrees ou des perles qui , elles, sont des liens vers des pages web. Ensuite, vous pouvez les manipuler, les supprimer et les organiser très facilement. Conserver e Conserver e
What a joy these maps are to behold. It’s as if someone took one of those composite satellite maps - you know, impossibly showing the whole world at night, the darkness broken by hubs and strings of artificial light (1) - and gave it the power of speech. For the riot of colours on these maps correspond to the diversity of languages spoken, or rather: typed, on Twitter. The explosive growth of the micro-blogging service’s global popularity is emblematic of a trend affecting the entire internet: it’s becoming less American, and less Anglophone. The most recent numbers I could find, indicate a drop in US-based ‘unique users’ from 62% in June 2009 to just over 50% in January 2010. 539 - Vive le tweet! A Map of Twitter's Languages | Strange Maps 539 - Vive le tweet! A Map of Twitter's Languages | Strange Maps
Accueil - Disposition de clavier francophone et ergonomique bépo

Accueil - Disposition de clavier francophone et ergonomique bépo

BÉPOla disposition de clavier francophone, ergonomique et libre Fréquences d’utilisation des rangées et des mains en azerty et en bépo. Les voyelles sont regroupées à gauche pour une meilleure alternance des mains.