Looking for Specific Literal File Names in Windows File Search
name:~”*( *.pdf” then you can use PowerRename to rename all the selected files
name:~”*( *.pdf” then you can use PowerRename to rename all the selected files
Xbox 360 Kinect & Windows 10 Buying a second-hand Kinect is a cheap option to get a 3D scanning capable device. Though it is not designed specifically for that purpose it can, using the right application, create a 3D model of an object, a room or a person. I’ve tried several times to install the XBOX 360 Kinect to my Windows PC with no success, but finally, I’ve made it work. Xbox 360 Kinect There is a Windows version of Kinect. It…
PART 1 How to access developer options on Amazon Fire TV? Similar to how you access developer settings on Android Accessing the hidden developer options on Amazon Fire TV, as we mentioned previously, is fairly simple. Here’s how to do it in a few simple steps. Select the gear icon on your Fire TV’s home screen to open Settings. Go to My Fire TV, and select About. Highlight the first option on the list, which is usually your device’s name, and press the…
This is a very good (re)-introduction to calculus. https://www.khanacademy.org/math/calculus-1
Things to Do in Dubrovnik Game of Thrones Walking Tour Game of Thrones Travel More Things to Do Crazy Tourist Things to Do
HP thinks they own my printer. The update in 2022 blocked non-HP ink cartridges from being used. Even though my printer has been using them off and on for over 4 years. I searched and found this fix for my HP 7740. https://www.youtube.com/watch?v=cqlmyZ-DQsg&t=90s and the firmware site as of this publishing is Mega Storage Link Do this at your own risk since you own your printer not me or HP. I will never buy another HP printer ever!!!
Linux Crontab: 15 Awesome Cron Job Examples by SathiyaMoorthy on June 11, 2009 An experienced Linux sysadmin knows the importance of running the routine maintenance jobs in the background automatically. Linux Cron utility is an effective way to schedule a routine background job at a specific time and/or day on an on-going basis. This article is part of the on-going Productivity Tips For Geeks series. In this article, let us review 15 awesome examples of crontab job scheduling. Linux Crontab…
If you do not run stats on Oracle database the performance degrades over time. The statements below will show the last stats update date/time. You must change the OWNER to match your schema of course. select min(STATS_UPDATE_TIME) from ALL_TAB_STATS_HISTORY where OWNER = ‘ADMUSER’ select * from ALL_TAB_STATS_HISTORY where OWNER = ‘ADMUSER’ order by STATS_UPDATE_TIME ASC
Microsoft Hyper-V Virtualization Managing Hyper-V from the Command Line http://www.virtualizationadmin.com/articles-tutorials/microsoft-hyper-v-articles/management/managing-hyper-v-from-command-line-part1.html
The Verification and Validation process areas are similar, but they address different issues. Validation demonstrates that the product, as provided (or as it will be provided), will fulfill its intended use, whereas Verification addresses whether the work product properly reflects the specified requirements. In other words, verification ensures that you built it right; whereas, validation ensures that you built the right thing. (from CMMI-Dev V1.3 Model) Verification is a testing which ensures that the product and product components meets the requirement…
Everything should be done into your <$JBOSS_HOME>/bin folder: Start Linux: $ ./standalone.sh & Windows: > standalone.bat Stop Linux: $ ./jboss-cli.sh –connect command=:shutdown Windows: > jboss-cli.bat –connect command=:shutdown Restart Linux: $ ./jboss-cli.sh –connect command=:reload Windows: > jboss-cli.bat –connect command=:reload Start in domain mode Linux: $ ./domain.sh & Windows: > domain.bat
Java SSL (keytool) Import a CA cert into a java keystore keytool -import -file ca-cert.pem -keystore /path/to/keystore -trustcacerts (-trustcacerts is important when adding a CA cert as it will add the CA cert to the keystore trust chain) The root CA cert should be all that’s necessary for Java cert verification; it doesn’t seem to require the intermediate CA certs like OpenSSL does. List the certs in a keystore keytool -list -v -keystore /path/to/keystore Working with JCE keystores If…
DER vs. CRT vs. CER vs. PEM Certificates and How To Convert Them Certificates and Encodings At its core an X.509 certificate is a digital document that has been encoded and/or digitally signed according to RFC 5280. In fact, the term X.509 certificate usually refers to the IETF’s PKIX Certificate and CRL Profile of the X.509 v3 certificate standard, as specified in RFC 5280, commonly referred to as PKIX for Public Key Infrastructure (X.509). X509 File Extensions The first thing…
Java Keytool is a key and certificate management utility. It allows users to manage their own public/private key pairs and certificates. It also allows users to cache certificates. Java Keytool stores the keys and certificates in what is called a keystore. By default the Java keystore is implemented as a file. It protects private keys with a password. A Keytool keystore contains the private key and any certificates necessary to complete a chain of trust and establish the trustworthiness of…
Project Management Notes Project Management[1] 1 What is a Project? 1.1 A project is any sort of planned undertaking All of us have been involved in projects, whether they be our personal projects or in business and industry. Examples of typical projects are for example: Personal projects: obtain an MBA write a report plan a wedding plant a garden build a house extension Industrial projects: construct a building provide a gas supply to an industrial estate build…
Example: Adding New OpenStack or Contrail Roles to an Existing High Availability Cluster This section provides an example of adding new nodes or roles to an existing cluster with high availability enabled. It is organized in the following: Adding New OpenStack or Contrail Roles to an Existing High Availability Cluster Purging a Controller From an Existing Cluster Replacing a Node With a Node That Has the Same IP Address Known Limitations and Configuration Guidelines Understanding How the System Adds a…
How To Setup SSH Keys on a Linux / Unix System by Vivek Gite on March 9, 2014 last updated October 20, 2016 in CentOS, Cryptography, Debian / Ubuntu, Linux, Openbsd, RedHat and Friends, UNIX I recently read that SSH keys provide a secure way of logging into a Linux and Unix-based server. How do I set up SSH keys on a Linux or Unix based systems? In SSH for Linux/Unix, how do I set up public key authentication? I…
CHEATER CALCULATOR — > http://chmod-calculator.com/ chmod owner|group|world filename Numeric equivalents (octal) based on the table below: 4 read (r) 2 write (w) 1 execute (x) Practical Examples: chmod 400 mydoc.txt read by owner chmod 040 mydoc.txt read by group chmod 004 mydoc.txt read by everyone chmod 200 mydoc.txt write by owner chmod 020 mydoc.txt write by group chmod 002 mydoc.txt write by everyone chmod 100 mydoc.txt execute by owner chmod 010 mydoc.txt execute by group chmod 001 mydoc.txt execute by…
Recover a forgotten root password on Redhat 7 Linux Selinux system The way on how you can reset a forgotten root password on a Linux system have not changed for many years. Resetting a root password on RHEL7 Linux system have not change much except that now we deal with SElinux and the system is now using systemd instead of init. Nevertheless, those who have already did reset root password on the Linux system will be with the following steps…
[formidable id=”2″ title=”1″]