@tonyshowoff Msgpack looks interesting. I've got an upcoming project where I need some very small footprint (low power 8 bit uC), some of the grid nodes probably even need to send data via SMS for example (160 bytes per message). Msgpack with MQTT... Need to do some reading
@garak0410 Just don't know how to tell it, with VBA, to take each job number in column W and do what it normally did the other way and then put a warning up if it doesn't match exactly and to STOP when it teaches a null cell.
Little helper function
Function IsNullOrEmpty(val as String) as Boolean
REM Strings are always initialized as "" in VB/VBA/VBS, so checking for Null is redundant. At least In theory.
If (val is Null or val = "") Then
IsNullOrEmpty = True
IsNullOrEmpty = False
Dim myRange As Range
Set myRange = Sheet1.Range("W1", "W5")
For Each ritem In myRange
If (IsNullOrEmpty(ritem.Value)) Then
REM Empty string, processing finished
REM Do something here with ritem.Value
The original script is a bit... ugly. Could be easier to have the XLS with test data only.
MobaXterm will support that, and much more. Macros, SSH tunnel (local and remote port forwarding), a handy SFTP browser which always points to the current directory in your sh session, PuTTY keygen, X11 forwarding and even simple things like arranging and undocking windows (something very simple I'm missing from most other clients)
I think they are using PuTTY behind the scenes, but thats just a wild guess. IMHO, that tool is far superior compared to mRemoteNG (which isn't bad at all).
Does it matter if it's a dog a cat or a snake? The pet was family, just like your child is family
Dude, not even the same at all. Don't try to compare animals to a child.
Not to split hairs here - but for some couples who are unable to have children (medically) a pet to you is a child to them. They have the same attachment and love for the animal as they would have for a child if they could have one.
It still not the same.
and it's still up to those parents to tend to their child/pet.
This is the bulk of what this boils down to for me. Be responsible. You don't want something you love destroyed/killed - then take care of it!
@Dashrender the problem with using an actual database like MySQL/MariaDB/SQL Express is that you then have to write an interface to even look at the data. For simple data, it is much easier to simply use the GUI that Access/Base provides to look at records.
That's mostly true. If the data is flat or flat-ish, though, standard free tools like myPhpAdmin will give you a GUI without any extra effort. It's not technically included in the base package, but is so standard that many people think of it that way. But definitely would not require writing your own interface if the data did not need to be reassembled in a relational way.
I heard a lot people say that they gave it up to relieve some legal pressure. But you can't commit crimes then just apologize and wash your hands. You can't save face by admitting guilt in this case. You'd get in trouble by admitting you were at fault and release the keys.
I agree that this is just to make the old code completely useless. Want to keep using software? You're gonna be buying all new software. Bold move!
It often does receive legal pressure because the total loss to a company is not so large. Because civil suits require there to be a damages number, making the damages smaller greatly reduces the value of a lawsuit which in turn reduces the likelihood of someone pursuing one.
@garak0410 oh dear, I know that We're using sharepoint a lot, but I have to keep telling my colleagues over and over again that it is a quite impossible to be the only embedded, networking and backend dev, the only admin guy and on top a sharepoint guru at the same time So yepp, I'm also a one man show.
Anyway, if you know some HTML, JS and CSS, you could build something on the client side. C# on the server side is another option. Like I said, it's not impossible.
Partly my own fault for a lack of motivation and discipline to study and learn but as @scottalanmiller has mentioned a few times, it is quite tough to do both. And that wasn't dogging what I do know because they love me here...But had another VBA project come up that they want done by Wednesday and if I can be "Superman" on that one, there might be hope for me...
You know just because I hate having to type "clear" every time... every linux system I have is getting the "cls" alias!
You can just do ctrl+l
And have to remember yet another keyboard shortcut?!
ctrl + l (L) is pretty universal for clear screen in the POSIX-compliant world, it's really about learning standard short cuts, like ctrl + k is delete line, ctrl + c is SIGINT, hell the latter even works in MSDOS and PowerShell.
The docs have a quick start video and there's a Google groups that is high volume. I digest it rather than read each message and then don't even read it much -- but searching the group is useful. https://groups.google.com/d/forum/ansible-project
Also Ansible uses yml so if that's new to you, might want to check out those parts first otherwise something as simple as a space may become a frustration to figure out.
Bingo. Just as I was reading your reply, I remembered that I had previously setup a .htaccess redirect to auto redirect 80 to 443 just to ensure that nobody tries to manage the box thorugh port 80. I disabled that temporarily and it worked right away. The cert is only valid for 3 months. Do you know if this will auto renew via the cert manager in FreePBX, or is it a manual process?
You can automate it, but you need to do some work to make it happen. Looks like the new certbot-auto makes it way easier. In your case I'd do a small script to open port 80, do the renewal, and reapply the security settings. The renewal is REALLY easy now, this is the crontab entry I'm using for it.
There were two parts... I didn't realize that Microsoft was at fault here, not Apple, since Apple has VNC natively built in but Microsoft RDC can't connect to Unix-like/Linux workstations.
Well, pretty much all Linux desktops will do RDP servers. You don't normally because it's not that great of a protocol. But if you want it, it's one command line instruction away. I've used RDP to manage Linux desktops plenty of times. It's Mac alone that doesn't build it in, it's only that Linux doesn't turn it (or VNC) on by default because X has been there for three decades already.
@Carnival-Boy Summed up many threads from that other place very well.
Not really. He's got a good summary of "why ESXi is his favourite" which he's said before and makes sense. That's very different from him telling everyone that the other three are stupid and have no support and only fools with failing businesses wouldn't pay for ESXi without any actual reasons for it.
Saying that it is his favourite and telling everyone else that they should only consider it are very different things. On SW it is the later.
@KOOLER That's basically everything what I've learned about the current situation on hyperconvergence and VSAN's during the last couple of months. Really appreciate your introductory disclaimer. Just remembering one of your posts a couple of months ago over at SW where you said something like "Actually, I'm the sales prevention guy here at StarWind".
Just for background - Fibrant is a municipal ISP that was setup by the City of Salisbury to fill in the gaps that other ISPs in the area refused to fill. They expanded from there and offer high speed services to the majority of the city.
but adding in SIP to services, that's where the problems tend to start. Being an ISP is good. Offering SIP is good. Putting the two together is generally bad. No
t always, of course, but pretty often.
Just because an ISP offers sip does not mean they are a shit IST
Yup, which I pointed out. I leans that way, but doesn't mean that it is the case.
That isn't what your first response was though. Your first response was very narrow and specific.
Yep, correlation doesn't equal causation. The two aren't related at all.
Ah, but they are. ISPs turn to SIP in many causes for the purpose of retaining customers in the face of competition based on quality of service.
I know a guy who built his own blade unit. Wooden blade enclosure and some simply power supplies and his own fans, then made it allow straight motherboards to slide in so that it make having a handful of systems running in a cluster super cheap. Pointless for production, but for a lab was very interesting.
Not all significant others disapprove. Mine helped me run the cables! (Helps to have another IT person in the house.)
Mine, too. Mine approved of a dedicated theatre room (a many years before they were the cool thing to do), helped pick out insanely high fi speakers for it, approved of painting it all black, fixed screen and even going so far as to have 1/3rd way into the room free standing speakers fore and aft, in ceiling mounted monoblock gear and all wiring run outside of the walls and back in to keep the room clear!
I knocked it down to 20MHz channel width and ran it for 14 hours with no pings over 20 ms. Users have been on it for 2 work days now and everything is working fine. I wish I understood the science behind it so I could know...
You could always try to go on a Ubiquiti training course for this kind of thing. - Depends on the location.
That's why we set any WAN-fancing SSH port to something obscenely high like 41022, not for "security" but because of the logs. In fact, all of our sshd services run following that pattern, as does our internal HTTP(S) servers but the load balancers take in 80/443.
This prevents as many services as possible from running as root, which anything running port < 1024 does. I don't think most people even know this. At the very least if there's a NAT in play, one can always set ssh and web services ports much higher and just translate the ports to avoid the same issue.
(I know there are some work arounds like setcap on Linux, but in general this is the default behaviour on most machines)
For some reason this made me think of The Venture Bros, Hunter Gather says:
And we want your sad ass undercover agents to stop trying to infiltrate our group. Frankly we're tired of killing them and we can't afford the body bags!
If backing up a 5.5 and restoring back onto a 5.5 still fails, then the only option you have (currently) is to do what the vendor said, backup the DB separately and the restore in the prescribed fashion.
I am horribly out of touch with novels in the last 8 years.
I miss reading. I have a library of ~1000 books all boxed up because this apartment has no space for them.
I'm a Sci-Fi / Fantasy guy.
sounds like my apartment too but scifi / military
We only have 6 bookshelves full of books (half shelves really). The wife is really good about weeding books and not keeping stuff around just for the sake of keeping it around. If it has no value for subsequent reads it gets chucked in a box and donated.
One of the more popular things to do around these parts is start your own free library
Tapping a phone line once it reaches a neighborhood hub is anything is trival I'm guessing. But the main point that I want to point out here is that tapping a phoneline requires physical access to something, somewhere in the path to make happen. This requirement makes the cost significantly higher than trying to get access to say email, through the previously mentioned malware attack.
Pretty easy to get access to phone lines if you are in any sort of business complex.
Even if you are not. In rural areas it is especially easy to tap lines. There is even equipment that allows you to tap the lines without climbing the poles, you can do it, touchless, from the ground!
Our buliding here is in a rural area.. but because we are the biggest company around Verizon brought the whole trunk of lines multiplex in to our buliding incase we need all of them we would have them.. there are resturants, stores, and urgent medical care centers all around us. all of their analog lines both phone and fax come into our building and we could listen in from the NID
Having worked as an alarm installer for 7+ years I too know how common this is.
I wander into the phone room and start clipping on to various pairs looking for the # I am supposed to use and end up finding all kinds of things that are not part of the company I am there working for.
One thing I left out is that the package also includes Veeam One for monitoring your virtual environment and backups. I can't remember if they sell either separately or not. So keep that in mind when determining cost.
All we know is that GPO for crytolocker was broken/denied thus any protection for CryptoLocker was disabled for at most 48 hours. It was a combination of incidents lead to CryptoLocker. Don't think flash is the cause here.