Showing posts from January, 2018

Memory sparing can reduce downtime from correctable errors by allocating one rank (64-bit wide data area on a DIMM) per channel as a spare.

If a correctable error occurs in a rank or channel, it’s moved to the spare rank while the OS is running. This prevents the error from causing a failure. Memory sparing reduces memory capacity by one rank per channel and increases the cost per gigabyte.

Memory mirroring has two adjacent memory channels configured to write the same data to each channel.

If one memory channel fails or encounters an error, the other channel continues to transmit data. It’s an excellent safeguard for systems requiring uninterrupted operation, though it cuts memory capacity in half, doubles the cost per gigabyte, and can increase power consumption.

Crisis Services Canada (CSC) is a collaboration of distress and crisis centres from across Canada, offering Canada’s first nationally available, regionally delivered suicide prevention service.

Canada Suicide Prevention Service (CSPS) is now available 24/7, via toll-free phone, text or chat to anyone thinking about or affected by suicide.

Facebook Bans Cryptocurrency, ICO Ads

Because Of 'Deceptive Promotional Practices'

OpenVZ is a container-based virtualization for Linux.

OpenVZ creates multiple secure, isolated Linux containers (otherwise known as VEs or VPSs) on a single physical server enabling better server utilization and ensuring that applications do not conflict. Each container performs and executes exactly like a stand-alone server; a container can be rebooted independently and have root access, users, IP addresses, memory, processes, files, applications, system libraries and configuration files.

OpenVZ is free open source software, available under GNU GPL.

OpenVZ is the basis of Virtuozzo, a virtualization solution offered by Virtuozzo company. Virtuozzo is optimized for hosters and offers hypervisor (VMs in addition to containers), distributed cloud storage, dedicated support, management tools, and easy installation.

The CentOS Web Panel interface.

The CentOS Web Panel interface. allows you to deploy and administer Apache, firewalls, MySQL databases, self-hosted email, user management, and other core system configurations.
To install, you need an updated CentOS installation, a functioning LAMP stack, and at least 1GB of RAM.

It’s important to reiterate that CentOS Web Panel is only officially supported on CentOS 6.x/7.x, RedHat 6.x/7.x, and CloudLinux 6.x/7.x.

Check Ram Size From Redhat Linux Desktop System

Redhat Linux: free command
To display amount of free and used memory (including total in the system), enter:
$ free -m
$ free -g
$ free -k

More detail:
$ cat /proc/meminfo

VMware offers supported, powerful system administration tools.

see for details.

The ESXi Shell can be disabled by an administrative user. See the
vSphere Security documentation for more information.

Download your Dell OEM Windows ISO

Go to: valid Service Tag & Verification Code then click Submit.Click the link to Download the recovery image.

Get DELL Service Tag on Windows

From cmd:

wmic bios get serialnumber SerialNumber XXXXXXX

Get DELL Service Tag on remote Linux system

$ sudo  dmidecode -s system-serial-number

The General Data Protection Regulation (GDPR) is a complex law with many requirements for protecting the security and privacy of personal data.

For GDPR compliant try

Discovering and managing your data needs

Establishing security controls to protect your data

Managing data requests and breach notifications

Every three years the Open Web Application Security Project (OWASP) has the unenviable task of compiling a list of the top 10 web application vulnerabilities.

The latest Top 10 is distressingly familiar.

With the internet, there is almost no need for people to meet face-to-face anymore.

We can do video conferences, sign documents remotely, share information in real-time, and talk with each other as if we were in the same room.

With blockchain, this is more reality.

The DMTF’s Redfish Developer Hub is a one-stop, in-depth technical resource – by developers, for developers

The DMTF’s Redfish Developer Hub is designed to provide all the files, tools, community support, tutorials and other advanced education you may need to help you use Redfish.

Reduce the chance of mobile battery explosion.

To reduce the chance of mobile battery explosion, put your battery in "low battery mode" while charging.

Amazon recently began improving the data encryption on its cloud storage service

Amazon simplified an agreement with customers over how it processes their information.

Machine-generated copy is content that was created by a computer.

Using an algorithm, the program comes up with the best combination of words that will interest readers and compel them with a call to action.

All men need to pass #metoo tests if they want to be leaders

It's not important whether the allegations are true or not, you need to pass the tests.

A palace coup: the 48-hour struggle to win control of the Ontario PC PartyPostmedia NewsMore from Postmedia News January 27, 2018

Research by Google indicates 53% of mobile sites are abandoned if load time is more than 3 seconds

Separate research from Google using a deep neural network found that as a mobile site's load time goes from 1 to 7 seconds, the probability of a visitor bouncing increases 113%.

Bank of America Gives its Corporate Customers an API

Using the API, these customers can access their banking information and perform real-time transactions. The bank believes that it will improve its ability to collaborate.

Google Cloud AutoML: drag-and-drop machine learning

From weekend warriors to Disney marketers, AutoML Vision lets anyone use a drag-and-drop interface to upload images and train, manage, and deploy custom models directly on GCP.

Consider using a pie chart when

You have only one data series.None of the values in your data are negative.Almost none of the values in your data are zero values.You have no more than seven categories, all of which represent parts of the whole pie.

Product key for Microsoft Office 2016 Professional Plus Trial

Use the product key provided below to activate your trial.


The trial period is good for 30-days, during which you will have ample time to complete this course. Once the trial period expires, you will have the option to purchase an Office 365 subscription or reinstall your current version using your original product key.

Microsoft Excel is one of the top tools for data analysis

The built-in pivot tables are arguably the most popular analytic tool.


Before You Leave On Vacation Back up your files so that you have a copy in case your device is stolen or infected with a virus.Update your devices with the latest security software.Use strong passcodes. A strong password should be at least eight characters long, include a combination of upper and lower case letters and at least one number, and include at least one character that is not a number or letter. Protect Yourself While Travelling Wi-Fi hotspots sure are convenient but they are also often unsecure networks and available to anyone. Don't shop or bank online using a Wi-Fi hotspot, and be very careful about what you send and receive.Don't leave devices unsecured in your hotel room. If there's a hotel room safe, use it.Avoid charging your phone at public charging kiosks or using USB ports on devices you don't own. These are untrusted devices and could leave you open to malicious software.If flying to your destination, do not pack your devices into luggage you're g…

Install pip

Download the installation script from

$ curl -O script downloads and installs the latest version of pip and another required package named setuptools. Run the script with Python:

$ python --userAdd the executable path to your PATH variable: ~/.local/bin To modify your PATH variable (Linux, macOS, or Unix) Find your shell's profile script in your user folder. If you are not sure which shell you have, run echo $SHELL.

$ ls -a ~
. .. .bash_logout .bash_profile .bashrc Desktop Documents DownloadsBash – .bash_profile, .profile, or .bash_login. Zsh – .zshrc Tcsh – .tcshrc, .cshrc or .login. Add an export command to your profile script.

export PATH=~/.local/bin:$PATHThis command adds a path, ~/.local/bin in this example, to the current PATH variable. Load the profile into your current session.

The ping command is a very common method for troubleshooting the accessibility of devices.

Ping uses a series of Internet Control Message Protocol (ICMP) Echo messages to determine: Whether a remote host is active or inactive.The round-trip delay in communicating with the host.Packet loss.
The ping command first sends an echo request packet to an address, then waits for a reply. The ping is successful only if:

the echo request gets to the destination, andthe destination is able to get an echo reply back to the source within a predetermined time called a timeout. 

Install NetworkManager-tui - a text interface to configure networking by controlling NetworkManager on Fedora CentOS RedHat

The NetworkManager text user interface (TUI) tool, nmtui, provides a text interface to configure networking by controlling NetworkManager. 

To install NetworkManager-tui, issue the following command as root:~]# yum install NetworkManager-tui

Install the EPEL repository

The CentOS Extras repository includes a package to install EPEL, and is enabled by default. To install the EPEL release package, run the following command:

sudo yum install epel-release

Red Hat Enterprise Linux
To install the EPEL release package, run the following command:

sudo yum install$(rpm -E '%{rhel}').noarch.rpm

Some EPEL packages depend on packages from the “optional” and “extras” channels, so ensure that those are enabled as well.

Fixed NFS “wrong fs type, bad option, bad superblock” error

On Rpm based such as CentOS, Red Hat, Oracle Linux:
$sudoyum-yinstallnfs-utilsOn Ubuntu:

fix the following error:
mount: wrong fs type, bad option, bad superblock on,
       missing codepage or helper program, or other error
       (for several filesystems (e.g. nfs, cifs) you might
       need a /sbin/mount.<type> helper program)

       In some cases useful info is found in syslog - try
       dmesg | tail or so.

Sort a file in-place

You can use the -o option of sort to indicate the same input and output file:

sort file -o file

A common mistake is to try to redirect the output to the same input file (e.g. sort file > file). This does not work as the shell is making the redirections (not the sort(1) program) and the input file (as being the output also) will be erased just before giving the sort(1) program the opportunity of reading it.

Reset and sync local repository with remote git branch

git fetch origin && git reset --hard origin/master && git clean -f -d

Fix-Dell iDRAC error: RAC0218: The maximum number of user sessions is reached

You can still ssh to your iDrac, after login,

Run the command:

racadm racreset
If you can access the server physically:

Hold in the “I” on the front of the server (near the power button) for about 20 seconds it will force a reset of the iDRAC. You’ll hear the fans speed up during this process but after a few mins you’ll be able to remotely access your iDRAC again.

Run a .jnlp file in Ubuntu

javaws ~/Downloads/cgoban.jnlp

IfThe program 'javaws' is currently not installed. You can install it by typing:
sudo apt install icedtea-netx

Restart Ubuntu server networking service

sudo ifconfig eno2 down &&  sudo ifconfig eno2 up

Add Persistence Static Routes

To add permanent Static route, edit file /etc/sysconfig/network-scripts/route-eth0 (eth0 is the device name) and add the following lines and save and exist. 
By default route-eth0 file will not be there, need to be created. For RHEL/CentOS/Fedora$ sudo vim /etc/sysconfig/network-scripts/route-eth0 via dev eth0For Ubuntu/Debian/Linux MintOpen the file /etc/network/interfaces and at the end add the persistence Static routes. IP Addresses may differ in your environment. $ sudo vi /etc/network/interfacesauto eth0
iface eth0 inet static
#########{Static Route}###########
up ip route add via dev eth0Next, restart network services after entering all the details using the following command. # /etc/init.d/network restart$ sudo /etc/init.d/network restart

For Ubuntu:
Restart Ubuntu server networking service

Configuring Static Routes Using the Command Line

Static routes can be added to the routing table by means of theip route addcommand and removed using theip route delcommand. The ip routecommands take the following form:ip route [ add | del | change | append | replace ] destination-addressSee the ip-route(8) man page for more details on the options and formats. Use the ip route command without options to display the IP routing table. For example:
~]$ ip route
default via dev eth0 proto static metric 1024 dev ens9 proto kernel scope link src dev eth0 proto kernel scope link src To add a static route to a host address, in other words to a single IP address:
~]# ip route add via [devifname]Where is the IP address of the host in dotted decimal notation, is the next hop address and ifname is the exit interface leading to the next hop. To add a static route to a network, in other words to an IP address representing a range …

Fixed: Dell laptop screen issue after Windows update

1. Press ON Button 2. When Screen Backlight turned on, spam F12 Button
F8 to get into Safe Mode has been disabled in Windows 10. You can enable it but it requires using BCEDIT to modify the boot process. Otherwise the standard way to get into Safe Mode is to hold the Shift key while pressing the Power > Restart button. When you get to the "Choose Options", select "Troubleshoot" > "Advanced options" > "Startup Settings" > "Enable Safe Mode", then reboot and select Safe Mode. Of course this does not help you if you cannot boot your system initially. In that case you need a bootable CD or flash drive containing a Windows 10 Recovery Drive or Windows 10 Installation media.

Routing is often handled by devices on the network dedicated to routing

Any device can be configured to perform routingIt is often not necessary to configure static routes on Linux servers or clients. Exceptions include traffic that must pass through an encrypted VPN tunnel or traffic that should take a specific route for reasons of cost or security. 
The default gateway is for any and all traffic which is not destined for the local network and for which no preferred route is specified in the routing table. The default gateway is traditionally a dedicated network router.

Static routes are for traffic that must not, or should not, go through the default gateway.

Delete your current default gateway.

Delete your existing default gateway if you intend to change it.
If you have more than one default gateway set, you'll run into connection conflicts. Type sudo route delete default gw IP Address Adapter.
For example, to delete the default gateway on the bond0 adapter, type sudo route delete default gw bond0.

Check your current default gateway.

You can check what your default gateway is set to by typing route and pressing ↵ Enter. 

The address next to "default" shows your default gateway, and the interface it is assigned to is displayed on the right side of the table.
$ route
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
default gateway UG 300 0 0 bond0 U 0 0 0 docker0 U 300 0 0 bond0

Your default gateway is the IP address of your router.

Typically this is automatically detected by your operating system during installation, but you may need to change it. This is especially true if you have multiple network adapters or routers on the network.

The ENS is a distributed domain name system solution for the blockchain

.ETH domains belong to the Ethereum Name System (ENS). The ENS is a distributed domain name system solution for the blockchain, allowing for readable addresses such as david.eth or company.eth instead of using long strings which are confusing. 
.ETH domains can be used for an Ethereum-Wallet in order to send or receive money, a smart contract or a swarm hosted site.
ENS is built on smart contracts on the Ethereum blockchain, meaning it doesn't suffer from the insecurity of the DNS system. You can be confident names you enter work the way their owner intended.

Price-to-earnings ratio

S&P 500's average P/E is 18.5

Cipher type your system supports

$ ssh -Q cipher localhost 

Blogger Dynamic theme needs full site feed to work


ssh supports several ciphers.

The ciphers used have a large impact on the performance. From faster ones to slower ones:
arcfour >> blowfish >> aes >> 3des
arcfour and blowfish have security problem.
It is also a good idea to enable compression by default so that ssh performs better over a low-bandwidth link, such as a slow Internet connection.

vim ~/.ssh/config:

Ciphers arcfour
Compression yes

Keep SSH session alive

$ vim .ssh/config #Create it if the configuration file does not exist. $ chmod 600 .ssh/config

Host remotehost:     HostName     ServerAliveInterval 188 #send the signal every 188 seconds to the remote host,

Alter MySQL table without locking

In case you are not sure if an ALTER TABLE will copy and/or block the table, and you want to make sure your DDL statement won’t cause such problems, you can add new alter specifications to the statement: ALGORITHM and LOCK.


How to disable device on Fedora

You can "grab" input from the unwanted device using evtest so that they are not delivered to other processes. 

To list all event devices: $ sudo evtest No device specified, trying to scan all of /dev/input/event* Available devices: /dev/input/event0:Lid Switch /dev/input/event1:Power Button /dev/input/event2:Sleep Button /dev/input/event3:Power Button /dev/input/event4:AT Translated Set 2 keyboard /dev/input/event5:Logitech USB Receiver /dev/input/event6:Logitech USB Receiver /dev/input/event7:DLLC6AE:00 06CB:75BF Touchpad /dev/input/event8:Video Bus /dev/input/event9:PS/2 Synaptics TouchPad /dev/input/event10:DELL Wireless hotkeys /dev/input/event11:HDA Intel PCH Headphone Mic /dev/input/event12:Dell WMI hotkeys /dev/input/event13:HDA Intel HDMI HDMI/DP,pcm=3 /dev/input/event14:HDA Intel HDMI HDMI/DP,pcm=7 /dev/input/event15:HDA Intel HDMI HDMI/DP,pcm=8 /dev/input/event16:HDA Intel HDMI HDMI/DP,pcm=9 /dev/input/event17:HDA Intel HDMI HDMI/DP,pcm=10 /dev/input/event18:Integrated_Webcam_HD: Integra…

GitHub has launched a new security alerts feature which will scan a project's dependencies for known vulnerabilities.

Start using security alertsWhether your projects are private or public, security alerts get vital vulnerability information to the right people on your team.
Enable your dependency graph
Public repositories will automatically have your dependency graph and security alerts enabled. For private repositories, you’ll need to opt in to security alerts in your repository settings or by allowing access in the Dependency graph section of your repository’s Insights tab.

Intelligent threat detection and continuous monitoring to protect your AWS accounts and workloads.

Amazon GuardDuty is a managed threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads. It monitors for activity such as unusual API calls or potentially unauthorized deployments that indicate a possible account compromise. GuardDuty also detects potentially compromised instances or reconnaissance by attackers.

Creating an Angular app With Angular CLI

1. Generate a minimalistic app with the inline template and styles with the following Angular CLI command:

ng new hello-world --minimal

2. Make a production build (it performs the AoT compilation by default):

ng build -prod

3. The npm package serve is a small web server that can gzip static files on the fly. Install it globally:

npm install serve -g

4. Change to the dist directory where the application bundles were generated and serve the app (it'll run on port 5000 by default):

serve .


Québec hydropower is a generating option with very low greenhouse gas emissions and no toxic waste

In 2015, the electricity produced in Québec accounted for 32% of Canada’s total power generated from all sources, but was responsible for only 1% of GHG emissions linked to electric utilities.

Mozilla’s Multi-Account Container extension is an add-on for the Firefox web browser.

Multi-Account Container extension separates browsing sessions and browser cookies, putting them in their own "Container" tabs that act independently of one another, even though they're in the same web browser window. 
Multi-account web browsing is perfect for keeping different aspects of your life separated while making switching between them pretty simple.
You can customize your Container with a name, color, and icon for easy identification.

iOS 11.2.5 includes support for HomePod and introduces the ability for Siri to read the news (US, UK, and Australia only).

The update allows the voice assistant to read the news, which can be activated with a simple "Hey Siri, play the news." Users can also request for specific news categories such as sports, technology, business, or music.
This update also includes bug fixes and improvements.

Bing has a feature where if you type linkfromdomain:[site name] it will highlight the best ranked outgoing links from that site

It helps you figure out which other sites your chosen site links to the most.

Having a website that only earns money through Adsense or a single affiliate program is extremely dangerous.

The failure to build more than one source of income from a website has doomed many websites.

Enable HD Voice on each of your phones

On recent Android phones, look for Settings->More->Cellular networks->Enhanced 4G LTE Mode. On iPhones, look for Settings->Cellular->Enable LTE and select Voice & Data.

SEO is crucial

Maintaining healthy relationships and building a strong network on the web is crucial, but search engine placement certainly can't be ignored either.

Eclipse - how to go to matching bracket?

Place the cursor next to an opening or closing brace and punch Ctrl + Shift + P to find the matching brace.

Google Social Casino Games beta program

“Social Casino Games" are defined as simulated gambling games (including, without limitation, poker, slots, bingo, lotteries, sports betting, betting on races, as well as other card games and casino games) where there is no opportunity to win anything of value (such as money or prizes).

Many publishers overlook the ads displaying on their web pages that serve no major purpose.

Examples include 404 error pages, Unsubscribe page, and Thank you page.

Since these pages typically have little content, displaying ads here spell deception.

Your visitors may think the ads are your website’s content and click on them.

Remember, using tactics that encourage unintentional clicks are not allowed.

Apple says the new tax law will help it will contribute $350 billion to the U.S. economy over the next five years.

Apple says it will create 20,000 new jobs and open a new campus.

Submit URL to Google Search Console

Submitting URL to Google Search Console is fundamental SEO practice.

Google adds new sites to its index, and updates existing ones, every time we crawl the web.

Increase display resolution for virtual Ubuntu on VirtualBox

$ sudo apt-get install virtualbox-guest-utils virtualbox-guest-x11 virtualbox-guest-dkms

netstat has been deprecated in favor of ss

netstat: command not found$ sudo ss -a | grep nfs
tcp    LISTEN     0      64                   *:nfs                   *:*       
tcp    LISTEN     0      64                  :::nfs                  :::*  

$ ss --help
Usage: ss [ OPTIONS ]
       ss [ OPTIONS ] [ FILTER ]
   -h, --helpthis message
   -V, --versionoutput version information
   -n, --numericdon't resolve service names
   -r, --resolve       resolve host names
   -a, --alldisplay all sockets
   -l, --listeningdisplay listening sockets
   -o, --options       show timer information
   -e, --extended      show detailed socket information
   -m, --memory        show socket memory usage
   -p, --processesshow process using socket
   -i, --infoshow internal TCP information
   -s, --summaryshow socket usage summary
   -b, --bpf           show bpf filter socket information

   -4, --ipv4          display only IP version 4 sockets
   -6, --ipv6          display only IP version 6 sockets
   -0, --packetdisplay PACKET sockets
   -t, --tcpdisplay onl…

Boost mode temporarily increases the power of your Cloud Shell VM

From the default g1-small machine type offering to a n1-standard-1 VM instance. This is handy if you'd like to continue working on Cloud Shell and need more CPU or memory resources for a relatively short period of time. To activate boost mode, find the 'Enable Boost Mode' option under the 'More' menu (the three dotted icon on the top right of Cloud Shell). Once activated, all sessions will be boosted for the next 24 hours. Enabling Boost mode restarts your Cloud Shell and will immediately terminate your session. A new VM will then be provisioned for you which can take a couple of minutes. The data in your home directory will persist, but all running processes will be lost. Boost mode is subject to regular usage limits. Currently, this feature is experimental and additional limits may be implemented in the future.

The Orion Client, "Your IDE in the Cloud"

The Eclipse Orion Project's objective is to create a browser-based open tool integration platform which is entirely focused on developing for the web, in the web. Tools are written in JavaScript and run in the browser. Great care has been taken to provide a web experience for development, rather than to recreate the traditional desktop IDE experience in a browser tab.
You can access Orion inside Google Cloud Shell.

Google Cloud Shell is an interactive shell environment for Google Cloud Platform.

Google Cloud Shell makes it easy for you to manage your projects and resources without having to install the Google Cloud SDK and other tools on your system. With Cloud Shell, the Cloud SDK gcloud command-line tool and other utilities you need are always available when you need them.

Google Cloud Shell is intended for interactive use only.

Non-interactive sessions will be ended automatically after a warning. Prolonged usage or computational or network intensive processes are not supported and may result in session termination without a warning.

If your session is terminated or cannot be established because you exceeded a service limit, Cloud Shell will display an error with a link to a form that allows you to appeal the limit violation. Click the feedback link and submit the form with more information about the tasks you were performing before your session was terminated.