To restart LDAP with most installations (not Mac OS X), use the following command:
krypted January 30th, 2005
A great resource for Windows DOS commands:
krypted January 28th, 2005
If you take an email address like my iCloud account, it’s email@example.com. If I take the username and add a + at the end I can then type some characters and put it all in front of the @ and domain name then the mail will still come to me. So, let’s say I use it to create an AppleID for an APNS certificate. That would be:
Or iPhone1 (or these days iPad1):
The only gotcha is that occasionally you’ll run into some field on a webpage that has input validation for non alpha-numeric characters. Shouldn’t be the case, but it comes up from time to time. I use this a lot. For example, rather than use my email w/ my credit card company, I can use krypted+SOMECOMPANY@me.com and then I can create filters in Mail a little more easily for mail that comes from them. The best part about that is that it then shows me really easily who is selling my information that shouldn’t. For example, you’d think SOMECOMPANY gets enough $ out of me as a paying customer, but apparently not because they’ve sold my email address to at least 3 or 4 companies.
krypted January 27th, 2005
X traffic takes up a lot of network bandwidth and is insecure. SSH offers compression making it slightly more efficient and security…
krypted January 25th, 2005
Posted In: Uncategorized
The cron command has officially been deprecated in Mac OS X, but still functions if called upon. cron starts a process that executes commands at specified dates and times. Regularly scheduled commands can be specified according to instructions found in the crontab files in the directory /var/spool/cron/crontabs. Users can submit their own crontab files via the crontab command. Crontab copies the specified file or standard input if no file is specified, into a directory that holds all users’ crontabs. crontab options:
A crontab file consists of lines of six fields each.The fields are separated by spaces or tabs. The first five are integers that specify the following (in order):
Each of these patterns may be either an asterisk (meaning all valid values) or a list of elements separated by commas. An element is either a number or two numbers separated by a minus sign ( meaning an inclusive range). Notice the time is in 24 hour format, 0 is midnight and 13 is one in the afternoon. The * wildcard can be used to run on every instance of a given object.
The sixth field of a line in a crontab file is a string to be executed by the shell at the specified times by the first fife fields. A percent character in this field (unless escaped by ) is translated to a newline character. Only the first line (up to a % or end of line) of the command field is executed by the shell. The other lines are made available to the command as standard input.
Any line beginning with a # is a comment and is ignored.
krypted January 24th, 2005
Have a logo you want to put on shirts but don’t have enough to have them printed up? Well, give cafepress a shot.
krypted January 23rd, 2005
Posted In: sites
Echo Save the batch file “AU_Clean_SID.cmd”. This batch file will do the following:
Echo 1. Stops the wuauserv service
Echo 2. Deletes the AccountDomainSid registry key (if it exists)
Echo 3. Deletes the PingID registry key (if it exists)
Echo 4. Deletes the SusClientId registry key (if it exists)
Echo 5. Restarts the wuauserv service
Echo 6. Resets the Authorization Cookie
Echo 7. More information on http://msmvps.com/Athif
net stop wuauserv
REG DELETE “HKLMSOFTWAREMicrosoftWindowsCurrentVersionWindowsUpdate” /v AccountDomainSid /f
REG DELETE “HKLMSOFTWAREMicrosoftWindowsCurrentVersionWindowsUpdate” /v PingID /f
REG DELETE “HKLMSOFTWAREMicrosoftWindowsCurrentVersionWindowsUpdate” /v SusClientId /f
net start wuauserv
wuauclt /resetauthorization /detectnow
krypted January 22nd, 2005
Posted In: Windows XP
krypted January 21st, 2005
Posted In: Network Infrastructure