ellimist.wordpress.com
Ellimist | Ellimist's Weblog
https://ellimist.wordpress.com/author/soumik2
The rants of an environment-concious geek. Posts by Soumik Ghosh:. May 11, 2015. My (very) subjective list of best anime OPs. January 28, 2011. Good, or not? March 12, 2010. How we successfully Save Our Tigers – Churumuri. March 2, 2010. April 13, 2009. April 11, 2009. An issue close to my heart… and lungs. January 17, 2009. I’m a Schizophrenic. Older Posts ». Create a free website or blog at WordPress.com. Blog at WordPress.com.
marcosabadi.blogspot.com
Blog Livre - Segurança da Informação e muito mais...: Abril 2015
http://marcosabadi.blogspot.com/2015_04_01_archive.html
Blog Livre - Segurança da Informação e muito mais. Blog com conteúdo sobre os projetos que tenho trabalhado: SEGURANÇA DA INFORMAÇÃO, VOIP COM ASTERISK, VIRTUALIZAÇÃO DE SERVIDORES VMWARE SERVER, ESX, EMAIL, FIREWALL, WEB-PROXIES, VPN, MIGRAÇÕES, LDAP, SAMBA, AD, ORACLE, MySQL, RADIUS, DHCP, DNS, PHP, C , AUTENTICAÇÃO WIFI, CAPTIVEPORTAL, SATELITE, NETWORK. ESTE BLOG TEM O OBJETIVO DE COMPARTILHAR O CONHECIMENTO". Quarta-feira, 22 de abril de 2015. Mounting ext4 partitions in Debian. Tune2fs -E test fs.
soumikghosh.com
Soumik Ghosh | About
https://www.soumikghosh.com/about
I am a web developer and technical consultant from Kolkata, India. I build platforms for high-traffic websites using tools like Nginx, Memcached, Xcache, etc. I am also profficient at Linux server administration and sysadmin jobs. I have also written a couple. Some of the technologies I have worked with (not exhaustive):. Some of the web applications I have worked with (again, not exhaustive):. Take a look at the services. I provide or what my clients think of me. A copy of my resume. A phpBB discussion ...
think-techie.com
May 2010
http://www.think-techie.com/2010_05_01_archive.html
Working hard to change the world according to my aspirations. Monday, May 31, 2010. Google just launched the encrypted search service. Basically, it works pretty much in the same way online banking or other login pages work. Using Secure Sockets Layer connections, the connection between you and Google is encrypted, so third parties (on your network), beyond you and Google, cannot look at your search terms and your search results pages. Posted by Bruno Simões. Links to this post. Thursday, May 20, 2010.
think-techie.com
June 2010
http://www.think-techie.com/2010_06_01_archive.html
Working hard to change the world according to my aspirations. Access Any Website Or Forum Without Registering. Tuesday, June 22, 2010. Let's imagine the following scenario: We are happily searching on Google and suddenly we find something really interesting however, when we try to open the URL, a different page is shown asking us to kindly register. Now we can ask to ourselves: Why Google can see this page? Is it registered at every forum or web page in the web? To prevent this, some websites may also us...
think-techie.com
How to overcome the iframe zoom limitation in iOS
http://www.think-techie.com/2013/03/how-to-overcome-iframe-zoom-limitation.html
Working hard to change the world according to my aspirations. How to overcome the iframe zoom limitation in iOS. Friday, March 15, 2013. Nevertheless, there is the possibly to simulate this feature by hacking the CSS property zoom. This property controls the magnification level for the current element. The rendering effect for the element is that of a "zoom" function on a camera. The possible values are:. No magnification is applied. The object is rendered as it normally would be. You might want to take ...
think-techie.com
January 2013
http://www.think-techie.com/2013_01_01_archive.html
Working hard to change the world according to my aspirations. Enabling HierarchyViewer on any retail phone. Sunday, January 27, 2013. Is an Android SDK tool that gives developers the ability to introspect on all aspects of an application's layout at runtime. The tool can be extremely useful for developers when debugging the view state of an application across a realm of devices. So how does it actually work? As a result you will be able to use HierarchyViewer with any device:. 1] Using Hierarchy Viewer&#...
think-techie.com
August 2010
http://www.think-techie.com/2010_08_01_archive.html
Working hard to change the world according to my aspirations. BlackBerry encryption is too secure. Saturday, August 14, 2010. The encryption developed by BlackBerry’s manufacturers, designed to ensure secrecy during corporate business deals is now facing some serious privacy issues. Indian authorities, who met with RIM officials on Friday, also pledged to go after other companies — including Google and Skype — to protect the country from cyber-spying and attacks planned over the Internet. The BBC also co...
think-techie.com
April 2010
http://www.think-techie.com/2010_04_01_archive.html
Working hard to change the world according to my aspirations. Complex Numbers for Dummies. Thursday, April 29, 2010. Today I decided to open a new chapter entitled "Mathematics". This new chapter will be mainly about Algebraic Coding Theory. We all know that $(-2) 2 = 4$ and $2 2 = 4$, but what happens when we want to take the square root of a negative number? If you think about it, aren't all numbers inventions? It's not like numbers grow on trees! Now, we have a number $i$ that has the property that $i...
think-techie.com
September 2009
http://www.think-techie.com/2009_09_01_archive.html
Working hard to change the world according to my aspirations. Wednesday, September 23, 2009. People with a proxy running on their networks run into a little snag when trying to access an SVN database through it. SVN over http requires more than the usual GET and POST. Proxies by default aren't configured to allow the extra http commands that SVN uses. However this problem can be solved. File in the following location. C: Documents and Settings [YOUR USERNAME]. Application Data Subversion servers. Probabl...