Recent content by Sheepykins

  1. S

    Joomla 2.5 search term character limit

    Hi, Novice to Joomla trying to set up a little website. Just thought i'd try posting here to see if anyone has any idea how to help :) There is currently a 3 character minimum limit on search results, we wish it to be lower and we tried lowering it to 1/2 characters. When we entered the 2...
  2. S

    Bash scripting csv files.

    Hi Fargle :p been experimenting with the following: #!/bin/bash while IFS=, read col1 col2 do echo "$col1" >/dev/null done < /tmp/testing.csv With that I'm able to echo the first column from the CSV and use it as a variable. Just trying to figure out the rest ;) Column 2 will ofc be the...
  3. S

    Bash scripting csv files.

    Hellooooo. Wasn't sure whether to put this here or progamming heh.. Basically, I'm looking to create a script and I'm new to Bash and Linux in general. I've seen some examples of what I want, but nothing that can show me how to do exactly what I want. I have a list of IP addresses in a csv...
  4. S

    TCL/Expect newbie

    Seems like expect/tcl and bash go quite nicely together, I've managed to get my if/else working and yeah - i've learned alot in the last few days trying to get the timeout option to work. I'm a code noob though, The problem i've found is getting expect to continue after the timeout. My code...
  5. S

    TCL/Expect newbie

    Hi Guys, Having a little trouble with TCL/expect. What started off as a simple script has rocketed away from me and unfortunately its causing me some grief. My expect script is in the following format: So far so good, expect matches against $engine and pushes my comment into my file with a...
  6. S

    IRC?

    People, including law enforcement agencies realise that total coverage of illegal content isnt possible, as long as you can prove you've made a very good attempt to try and keep it off, they usually cut you slack. I think it could work
  7. S

    Protection for Java Zero Day Vuln?

    From what i gather Please, it doesnt really matter what security you're using. If you're running Java on a platform with the latest versions you can be compromised. The only way is to either disable java or roll back. and rolling back would give you a ton more problems :OhGodWhy:
  8. S

    Protection for Java Zero Day Vuln?

    oh craaaaaap. that says the blackhole exploit kit might get this for an update. Im taking this a little more seriously now ;)
  9. S

    Protection for Java Zero Day Vuln?

    If you can find a common theme, blocking using a proxy server could be useful for a corporate environment. Many of the Cisco IPS sensors i use have REGEX that can be jury rigged for proxy server REGEX filtering.
  10. S

    Having Downloading issues

    wireless signals such as that would definatly be quite erratic. Sattelite is only ever good for UDP based services because the connection can die at the drop of a hat and packets can be lost. I'd imagine the same with some kind of long range antenna I'd invest in a wired connection :( all i can...
  11. S

    Having Downloading issues

    Hi, first of all i think you wasted money on a PCI wireless card, the usb 2.0 ethernet adapter should support speeds of up 54mb/s at the lowest depending on signal strength, connection and which standard you're using (most are 802.11g by default) and the transfer speeds of usb 2.0 is something...
  12. S

    Have you modified your logon screen? If so post an image!

    Yeah i do it all the time ;) my favourite was just a big retro sign saying "Wintendo" here is my current. its hard taking a picture of a screen with crap lighting but i think its visible
  13. S

    dual boot

    dual booting = installing two operating systems on the same hard-drive, only one booted at any time. virtual machine = a piece of software allowing you to run an OS in a little window, inside the one you're currently using
  14. S

    NA Warcraft users - Possible Hack on accounts

    So yeah, someone at Blizzard has been found stealing ;0 NA users have been told to change their passwords http://sea.blizzard.com/en-sg/securityupdate.html it does state internal network but damn.... it comes to this when you cant even trust your own employees.
  15. S

    Connecting to the internet using other details.

    as much as I can understand how much of an emergency it can be to get your lolcats update :P.... Internet connection sharing isnt unethical or illegal..... but then, you brought that up... which makes me think it might not exactly be your friends network. But then, it would need to be close...
Back
Top Bottom