Saturday, December 13, 2008

Unix Tip: FORGET THE CRONTAB MAN

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

UNIX GURU UNIVERSE
UNIX HOT TIP

Unix Tip 3186 - October 26, 2008

http://www.ugu.com/sui/ugu/show?tip.today

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=


FORGET THE CRONTAB MAN

For some reason many admins forget the field order of the
crontab file and alway reference the man pages over-and-over.
Make your life easy. Just put the field definitions in
your crontab file and comment (#) the lines out so the
crontab file ignores it.


#minute (0-59),
# hour (0-23),
# day of the month (1-31),
# month of the year (1-12),
# day of the week (0-6 with 0=Sunday).
# commands
0 2 * * 0,4 /etc/cron.d/logchecker

Thursday, November 27, 2008

How to graph a data if all are string in openoffice calc

Let say you have a data that shows all the reasons why subscribers are being disconnected.



and you want to make a graph out of that data that will show how many subscribers really fall under those reasons.

Heres how you do it in Openoffice.org Spreadsheet (Calc).

use the COUNTIF finction in Openoffice.org Spreadsheet,countif returns the number of cells that meet with certain criteria within a cell range.

=COUNTIF(E19:E32;"cant afford to pay")
=COUNTIF(E19:E32;"Tv Defect")

once you have the data as shown below, it time to graph.

Cant afford to pay 7
Tv Defect 3


Hight light those two data then go to Insert --> Chart (Just follow the wizard), output bellow:

Tuesday, November 25, 2008

Beware of identity theft

INQUIRER.net
First Posted 09:37:00 11/25/2008

Identity theft is using someone’s identity to get money, purchase goods and services, or receive other benefits.

According to Citibank's Use Credit Wisely website, “identity theft happens when someone accesses essential elements of a person’s identifying information in order to commit fraud or theft. This information includes name, address, Tax Identification Number (TIN), Social Security number, date of birth and mother’s maiden name.”

With the Internet, identity theft can happen anywhere, even here in the Philippines. It is fraud that is perpetrated by criminals in many ways to open credit card accounts, obtain loans and even mortgages in someone else’s name. Some even hack e-mail accounts then send a hoax e-mail asking for financial help from friends and relatives using the victim’s own e-mail address and contact list. Or the fraudsters may use someone’s identity to illegally obtain resident status in other countries or commit other crimes.

How to Protect your self from identity theft:

1. Protect your mailbox. This refers to your physical mailbox at your place of residence. Always remove your mail as soon as the mailman makes a delivery. Identity thieves have been known to steal mail and go through them to obtain information that can be valuable to them.

2. Protect your wallet. Some people keep a lot of stuff in their wallet—old receipts, credit card charge slips, ATM receipts, deposit slips, and all IDs, including their SSS and TIN cards. Minimize your risk by keeping items with personal information in a safe place at home. If you don’t need your SSS and TIN cards for the day, for instance, leave them at home. Make it a habit to go through your wallet and shred receipts and other papers if you don’t need them anymore.

3. Protect your credit and debit cards. As soon as you receive your credit card, sign on the back immediately. Never let anyone use your credit card. Don’t write down your ATM PIN or account number. When you change addresses and phone numbers, inform your credit card issuer and bank as soon as possible. Report stolen or lost cards right away.

4. Protect your computer. Use an anti-virus software, as well as a firewall and anti-spyware software. This will help deter criminals’ efforts in stealing your personal information. Also, visit only secure websites (those with “https” in the address and a small padlock icon in the lower right hand corner). Regularly update your browser so new plugs for security holes can be installed. Don’t open mysterious e-mail attachments from people you do not know. These attachments may contain viruses that fish for information and may lead you to dummy sites where you will be led to input financial information.

5. Refrain from accessing your financial accounts through a public computer. If you do online banking, do so in the privacy of your home or office where you have anti-virus, firewall, and anti-spyware programs installed. Always log off after doing online banking.

6. Monitor your accounts. Go over your billing statements and bank accounts regularly. As soon as you spot an irregular transaction, call the bank or credit card company.

VICTIMIZED? WHAT TO DO
If you feel you have been victimized by identity thieves, take action immediately.

1. Contact creditors. These include credit card companies, phone companies, utility companies, banks, and other lenders. Explain what happened. Close accounts that have been tampered with and open new ones with new PINs and strong, hard-to-guess passwords.

2. File a police report. Get a copy and give one to the bank and other creditors.

RECLAIMING YOUR IDENTITY
Take extra steps to make sure identity theft does not happen to you again.

When you have closed tampered accounts, open a new account that would offer more security, such as a password before any inquiry or change can be made.

For stolen checks or checking accounts that have been tampered, issue a stop payment instruction. Cancel your ATM card and request for a new one then have a new PIN.

If your investment account has been hacked, report it immediately to your broker or account officer.

If a new phone service has been subscribed for using your name and you are being billed for it, contact the phone company right away and cancel the account.

Identity theft is a real crime, but as more people become aware of it and observe safeguards, there will be fewer victims around.

Thursday, November 6, 2008

print 'Hello,Trinity!'

Late post again! I have limited internet access in valenzuela since my work is now in bicol, anyway I been busy with a new server her name is trinity born Oct. 28 3:48pm weights 8.4 same place where my other server was born linuscarl at manila docs. Heres some advice before you give birth and admit your wife to the hospital always ask how much is your ob PF(Professional Fee) and ask discount before hand. Below are some pics:






Sunday, October 12, 2008

Openoffice Tips (exponential function)

To make a exponential in openoffice

do

Ctrl-shift-p gives the right result (2²)

to remove it

ctrl-shift-b

Saturday, October 11, 2008

Basic Linux Command (Kill a print job)

I had a problem killing my print job seems that it got stock and the message annoys me,there is no icon for the printer and option to kill the job so here is what I did. There are two option:

Option A:

point your browser to http://localhost:631/jobs

Option B: (this is the option I choose)

run lpq -a from a terminal

it will show the jobs that are trying to run



Then

run lprm "jobid"


Since there are allot of jobids i made a simple script:

$for i in '54 56 58 59 60 61'; do lprm $i; done

Saturday, October 4, 2008

The CentOS Adventure

You should not forget where you came from, I could relate this with my adventure with centos (CentOS is a freely-available operating system that is based on Red Hat Enterprise Linux. ) During my early years with linux I started with RedHat 7.2 till RedHat 9 then my previous company switch to mandrake actually its a customize drake we were installing from a harddisk to our server (I forgot doing that) I been setting up proxys, firewall and samba server with it.Next was debian I fall in-love with apt-get although yum was ok with me during those days but apt-get was an easy breez coz no dependencies was miss out by apt-get. Then Ubuntu came it was a haven OS for me. Now I'm setting up a LTSP out of Centos,why? Audio issue unsloved. So I would like to try it in RedHat environment. I said to my self this is just old times but when I was configuring it I'm using debian commands and paths, although linux commands and paths are universal there are still some would be different like for example network config in ubuntu I go to /etc/network/interfaces to edit my network interface card while in centos its under /etc/sysconfig/network-scripts/ifcfg-eth*. Also if I want to know what release I'm using I typed lsb_release -a, this command wont work with centos. My adventure is not yet over I will still be diving or lets says visiting with my old roots of linux.