INFORMATION TECHNOLOGY ARTICLES
If you are using WordPress as the platform behind your blog or website you probably know that there have been a lot of security holes, not just in the software itself, but also in the plugins as well. In light of these problems, we’ll look at how to prevent hacking attempts by locking down your administration folder.
While troubleshooting a programming problem today I noticed that you can’t use a LIKE search for string columns containing special characters like % or _ without using a special syntax. Figuring out the problem took only a few minutes, but remembering syntax is always easier if you write about it.
Has this ever happened to you? I created a new virtual machine running Ubuntu on my VMware server before I left home, but forgot to install the ssh server… so I couldn’t get to that machine at all from my remote location. Rather than driving back home I decided to find a solution.
One of the biggest security holes you could open on your server is to allow directly logging in as root through ssh, because any cracker can attempt to brute force your root password and potentially get access to your system if they can figure out your password.
When you are working on increasing the speed of your website, a very important piece is making sure you get every last drop of performance out of your database server. Unfortunately, for most of us that aren’t normally database administrators this can be a difficult proposition.
In IT having good backups is extremely essential. Your worst nightmare is when an end user deletes the company yearly accounting reports. If your business is using Server 2003 getting those files back in a hurry is extremely easy with the Shadow Copy feature. This feature was added to Server 2003 for just such instances. In fact, by educating the end users they can retrieve the files without having to involve IT.
I’m the type of geek that has an SSH client open at all times, connected to my most frequently used servers so that I have instant access for monitoring and anything else. As such, it irritates me greatly when I get disconnected, so I’m sharing a few methods for keeping your session alive.
Today a reader had a very good question about lsass.exe is the Microsoft security management process for domain access and local security policies. Simply put it manages who logs on to your PC and/or Server. There are a few viruses that mimic this process. The Sasser virus was one of the more popular attacks a few years ago. The Sasser worm would exploit lsass.exe so that XP would start a countdown of 60 seconds advising you to save your work. Every time you rebooted your machine this would keep happening. This process is located in C:WindowsSystem32 in either a PC or Server. If you were to find it in any other location in your system … it is a virus.
I have been testing Windows Home Server (WHS) for about 6 months now. I thought I would write a few things about this new product from Microsoft. Basically, WHS is meant to be a computer which will sit in your closet and deliver multimedia content to various computers and other geek gadgets around your house. You are able to create user accounts, stream music and video, and create backups to your home server. Your children can watch a movie on their computer while you listen to your favorite music or vice versa. Saving copies of your files is just like you would do at work if you put them on a network drive.
Windows is always trying to save you from yourself and with Windows Home Server it is no exception. Anytime you log on as the administrator, you receive an annoying caution message, but we can disable this annoying message from coming up every time you log on to your server.
So you’ve got MySQL on your web server, but it’s only opened to local ports by default for security reasons. If you want to access your database from a client tool like the MySQL Query Browser, normally you’d have to open up access from your local IP address… but that’s not nearly as secure.
My favorite feature in the latest version of VMware Workstation is that you can run virtual machines entirely in the background. This is most useful for “appliance” machines that you won’t actually use from the prompt, but through a web browser or ssh client.
A very common task for a web developer is uploading a single file from a subdirectory on your development box to the same subdirectory on a remote server. Unfortunately, this always ends up being an annoying manual process involving switching directories on both servers, and wastes a large amount of time.
As this site has gained popularity, the time required to keep the site running has also grown. For instance, even though Akismet blocks virtually all of the spam comments, I still have to manually filter through hundreds of spam comments per day to see if any valid comments were blocked.
If you are running a web application using the original ASP technology on Windows Server 2003, you might get this error message once you upgrade to Service Pack 2: “New transaction cannot enlist in the specified transaction coordinator. [-2147168246]”.
Microsoft’s SQL Server has a tool called Profiler that you can use to monitor every SQL query that hits the database. This is extremely useful for programmers as well as database administrators to troubleshoot the exact queries generated by an application.