Sunday, February 19, 2012

How to edit the hosts file in Mac OS X – Leopard

Introduction

The hosts file is a text file that maps hostnames to IP addresses.
Upon typing a url address on the browser, the system is checking if there is a relevant entry on the hosts file and gets the corresponding IP address, else it resolves the IP via the active connection’s DNS servers.

The hosts file can be edited to block certain hostnames (like ad-serving/malicious hosts), or used for web development purposes, i.e. to redirect domains to local addresses.

Editing the hosts file

Editing the hosts file in Mac OS X – Leopard, is a pretty easy task, especially if you are familiar with the terminal.

Step 1 – Open the Terminal.app

Either by start typing Terminal on the Spotlight, or by going into Applications -> Utilities -> Terminal.

Step 2 – Open the hosts file

Open the hosts by typing on the Terminal that you have just opened:

 










1$ sudo nano /private/etc/hosts




 

Type your user password when prompted.

Step 3 – Edit the hosts file

The hosts file contains some comments (lines starting with the # symbol), as well as some default hostname mappings (e.g. 127.0.0.1 – localhost).
Simply append your new mappings underneath the default ones. Or edit one of the default values if you know what you are doing!
You can navigate the file using the arrow keys.

Step 4 – Save the hosts file

When done editing the hosts file, press control-o to save the file.
Press enter on the filename prompt, and control-x to exit the editor.

Step 5 – Flush the DNS cache

On Leopard you can issue a simple Terminal command to flush the DNS cache, and have your host file changes to take immediate effect:

 










1$ dscacheutil -flushcache




 

You can now test your new mapping on the browser!

Sunday, February 12, 2012

How to speed up Lotus Notes client 8.5x

These are the steps:
1. Close lotus notes.
2. Open the folder/directory where you install lotus notes client, in my case c:\lotus\notes
3. Find the file “\IBM\Lotus\Notes\framework\rcp\deploy\jvm.properties” and edit.
4. Within the file, find the line “vmarg.Xmx=-Xmx256m” and change it into “vmarg.Xmx=-Xmx512m”
5. Within the file, find the line “vmarg.Xms=-Xms48m” and change it into “vmarg.Xms=-Xms96m”
6. Save the file.

Monday, February 6, 2012

How do I remove the temporary mailbox message that appears every time I log in to my Exchange profile in Outlook?

The temporary mailbox message is:
Your mailbox has been temporarily moved on the MS Exchange server. A temporary mailbox exists, but might not have all of your previous data. You can connect to the temporary mailbox or work offline with all of your old data. If you choose to work with your old data you cannot send or receive email messages.

For Windows XP:


Remove your current Exchange profile:

  1. Go to Control Panel > Mail > Profiles > Show profiles.

  2. Highlight the current Exchange profile you are using and click Remove.

  3. Click YES when you are asked if you are sure.

  4. To close the window, click OK.

  5. Open Windows Explorer.

  6. Browse to the folder C:\Documents and Settings\user\Local Settings\Application Data\Microsoft\Outlook.

  7. Highlight and delete the Outlook.ost file. (See NOTE below.)

  8. Recreate a new profile, which will create a new .ost file.


NOTE: The Outlook.ost file is in a folder that is "hidden" by default. If you do not see the folder, you may need to change the view settings in Explorer, as follows:

  • Go to Tools>Folder options, View tab

  • Check the radio button for Show hidden files, folders, and drives

  • Uncheck the box for Hide protected operating system files (recommended)

  • Click YES when you are asked if you are sure.

  • To close the window, click Apply and OK.


Result: C:\Documents and Settings\user\Local Settings\Application Data\Microsoft\Outlook folder will now show up.

For Windows Vista:


Remove your current Exchange profile:

  1. Go to Control Panel > Mail > Profiles > Show profiles.

  2. Highlight the current Exchange profile you are using and click Remove.

  3. Click YES when you are asked if you are sure.

  4. To close the window, click OK.

  5. Open Windows Explorer.

  6. Browse to the folder C:\users\username\appdata\local\Microsoft\Outlook.

  7. Highlight and delete the Outlook.ost file. (See Note below.)

  8. Recreate a new profile, which will create a new .ost file.


NOTE: The Outlook.ost file is in a folder that is "hidden" by default. If you do not see the folder, you may need to change the view settings in Explorer, as follows:

  • Go to Organize>Folder and Search options, View tab.

  • Check the radio button for Show hidden files, folders, and drives.

  • Uncheck the box for Hide protected operating system files (recommended).

  • Click YES when you are asked if you are sure.

  • To close the window, click Apply and OK.


Result: C:\users\username\appdata\local\Microsoft\Outlook folder will now show up.

How to install gtk-vnc-python in RHEL-Red Hat/Fedora Linux?

gtk-vnc is a VNC viewer widget for GTK2. It is built using coroutines allowing it to be completely asynchronous while remaining single threaded. A module allowing use of the GTK-VNC widget from python(as described by yum info)

Let’s first search for the package










$ yum search gtk-vnc-python

gtk-vnc-python.i686 : Python bindings for the gtk-vnc library




 

Note that you must be the root/administrator to install the package. To install this package in Red Hat/Fedora Linux.










$ yum install gtk-vnc-python.i686




You can check the details of this package gtk-vnc-python










$ yum info gtk-vnc-python.i686



Quick Installation: Enable DAG’s CentOS yum repository

A quick post with instructions to enable DAG’s Yum Repository (rpmforge) for CentOS 4, CentOS 5 and CentOS 6,REDHAT

Installation is simply done by RPM packages:

 

CentOS 6 / i386 (32-bit):
rpm -Uvh http://apt.sw.be/redhat/el6/en/i386/rpmforge/RPMS/rpmforge-release-0.5.2-2.el6.rf.i686.rpm

CentOS 6 / x86_64 (64-bit):
rpm -Uvh http://apt.sw.be/redhat/el6/en/x86_64/rpmforge/RPMS/rpmforge-release-0.5.2-2.el6.rf.x86_64.rpm

CentOS 5 / i386 (32-bit):
rpm -Uhv http://apt.sw.be/redhat/el5/en/i386/rpmforge/RPMS/rpmforge-release-0.3.6-1.el5.rf.i386.rpm

CentOS 5 / x86_64 (64-bit):
rpm -Uhv http://apt.sw.be/redhat/el5/en/x86_64/rpmforge/RPMS//rpmforge-release-0.3.6-1.el5.rf.x86_64.rpm

CentOS 4 / i386 (32-bit):
rpm -Uhv http://apt.sw.be/redhat/el4/en/i386/rpmforge/RPMS/rpmforge-release-0.3.6-1.el4.rf.i386.rpm

CentOS 4 / x86_64 (64-bit):
rpm -Uhv http://apt.sw.be/redhat/el4/en/x86_64/rpmforge/RPMS/rpmforge-release-0.3.6-1.el4.rf.x86_64.rpm

 

Please select the correct command from the following list:Supported

Extract tar.gz File

Q. How do I extract tar.gz file under Linux / UNIX like operating systems?

A. tar.gz is nothing but compressed tar archive.

The tar program provides the ability to create tar archives, as well as various other kinds of manipulation. For example, you can use Tar on previously created archives to extract files, to store additional files, or to update or list files which were already stored.

Initially, tar archives were used to store files conveniently on magnetic tape. The name "Tar" comes from this use; it stands for tape archiver. Despite the utility's name, Tar can direct its output to available devices, files, or other programs (using pipes), it can even access remote devices or files (as archives).

Extract tr.gz. file


To extract one or more members from an archive, enter:
tar -zxvf {file.tar.gz}
If your tarball name is backup.tar.gz, enter the following at a shell prompt:
tar -zxvf backup.tar.gz

Extracting an Entire Archive


To extract an entire archive, specify the archive file name only, with no individual file names as arguments.
tar -zxvf backup.tar.gz

The ugly face of Facebook
















Blackmailing, jilting, among complaints to CID










There are complaints where false Facebook accounts have been created under a person’s name and obscene pictures included in it.

More than 300 complaints against the posting of obscene and personal pictures of persons on Facebook – the social networking service - have been made to the Criminal Investigations Department.
The CID’s Cyber Crime Division is probing the cases which also include a few cases of hacking into Facebook accounts.

Nearly 70 per cent of the cases were instances where, after jilting the lover, one party posts personal pictures and videos recorded secretly, he/she would have shared during their affair, an officer involved in the investigations said.

He said that in some of the cases chat-conversations on Facebook between the couple have been saved or recorded and published. Also among the complaints were instances where nude pictures too had been posted.

“There are also cases where persons have been blackmailed demanding money or instances of threatening to blackmail unless sexual favours were granted, if the demands were not met,” he said.
In one of the cases a girl receiving higher education had responded to a ‘friend request’ on Facebook. After several months she had posed in a semi-nude position, which had been captured on video via a web-cam. A few months later the man had started demanding money if she wanted the pictures not to be made public.

The man was arrested following a complaint lodged by the girl. He said there were also complaints where fake Facebook accounts had been created under a person’s name and obscene pictures included in it.

An officer said that people using Facebook should take precautions when using the social network system. “Whenever a request is made by an unknown person to add you as a friend you check out carefully who the person is and the friends of that person already on Facebook.

“You can also use some of the settings available on the system where any person has limited access to your account. After monitoring the person for some time you can decide whether the person should remain in your network,” he said.

He said people could contact the Cyber Crime Division in the event of any violation of their privacy.