Hi,
Novice to Joomla trying to set up a little website. Just thought i'd try posting here to see if anyone has any idea how to help :)
There is currently a 3 character minimum limit on search results, we wish it to be lower and we tried lowering it to 1/2 characters.
When we entered the 2...
Hi Fargle :p
been experimenting with the following:
#!/bin/bash
while IFS=, read col1 col2
do
echo "$col1" >/dev/null
done < /tmp/testing.csv
With that I'm able to echo the first column from the CSV and use it as a variable. Just trying to figure out the rest ;)
Column 2 will ofc be the...
Hellooooo.
Wasn't sure whether to put this here or progamming heh..
Basically, I'm looking to create a script and I'm new to Bash and Linux in general.
I've seen some examples of what I want, but nothing that can show me how to do exactly what I want.
I have a list of IP addresses in a csv...
Seems like expect/tcl and bash go quite nicely together, I've managed to get my if/else working and yeah - i've learned alot in the last few days trying to get the timeout option to work.
I'm a code noob though,
The problem i've found is getting expect to continue after the timeout.
My code...
Hi Guys,
Having a little trouble with TCL/expect.
What started off as a simple script has rocketed away from me and unfortunately its causing me some grief.
My expect script is in the following format:
So far so good, expect matches against $engine and pushes my comment into my file with a...
People, including law enforcement agencies realise that total coverage of illegal content isnt possible,
as long as you can prove you've made a very good attempt to try and keep it off, they usually cut you slack. I think it could work
From what i gather Please, it doesnt really matter what security you're using. If you're running Java on a platform with the latest versions you can be compromised.
The only way is to either disable java or roll back. and rolling back would give you a ton more problems
:OhGodWhy:
If you can find a common theme, blocking using a proxy server could be useful for a corporate environment. Many of the Cisco IPS sensors i use have REGEX that can be jury rigged for proxy server REGEX filtering.
wireless signals such as that would definatly be quite erratic. Sattelite is only ever good for UDP based services because the connection can die at the drop of a hat and packets can be lost. I'd imagine the same with some kind of long range antenna
I'd invest in a wired connection :( all i can...
Hi,
first of all i think you wasted money on a PCI wireless card, the usb 2.0 ethernet adapter should support speeds of up 54mb/s at the lowest depending on signal strength, connection and which standard you're using (most are 802.11g by default) and the transfer speeds of usb 2.0 is something...
Yeah i do it all the time ;) my favourite was just a big retro sign saying "Wintendo"
here is my current. its hard taking a picture of a screen with crap lighting but i think its visible
dual booting = installing two operating systems on the same hard-drive, only one booted at any time.
virtual machine = a piece of software allowing you to run an OS in a little window, inside the one you're currently using
So yeah, someone at Blizzard has been found stealing ;0
NA users have been told to change their passwords
http://sea.blizzard.com/en-sg/securityupdate.html
it does state internal network but damn.... it comes to this when you cant even trust your own employees.
as much as I can understand how much of an emergency it can be to get your lolcats update :P....
Internet connection sharing isnt unethical or illegal..... but then, you brought that up... which makes me think it might not exactly be your friends network.
But then, it would need to be close...