| |
Current Topic: Technology |
|
Self-assembling gel stops bleeding in seconds |
|
|
Topic: Technology |
9:23 pm EST, Nov 5, 2006 |
Swab a clear liquid onto a gaping wound and watch the bleeding stop in seconds. An international team of researchers has accomplished just that in animals, using a solution of protein molecules that self-organise on the nanoscale into a biodegradable gel that stops bleeding. If the material works as well in humans, it could save thousands of lives and make surgery far easier in many cases, surgeons say.
OOooh! Put this stuff in bullets to make them less lethal? Self-assembling gel stops bleeding in seconds |
|
HOWTO: Create a MySQL 5 Linked Server from MS SQL Server 2005 |
|
|
Topic: Technology |
5:41 pm EST, Nov 1, 2006 |
The most relevant HOWTO document on how to do this is in a PDF here: http://developer.infi.nl/daniel/Linking%20MySQL%20and%20MSSQL.pdf I have mirrored it here: http://www.lucision.com/legal/rjurney/Linking%20MySQL%20and%20MSSQL.pdf There is a truncated HTML version of this article on the same site, but it stops in the middle of the provider string. Provider strings are important. You can find them, including one for MySQL, here: http://www.connectionstrings.com/ Now, I followed the directions in these tutorials and still could not get it to work. What made it work? I restarted SQL Server 2005 and it just all worked immediately, with a query like this: SELECT * FROM OPENQUERY(LINKEDLUCISION, 'select * from mydatabase.tablename') GO Queries of the format SELECT * FROM LINKEDLUCISION.mydatabase..tablename still do not work. I dunno how to do these, but in my case we will be creating a VIEW that uses the OPENQUERY, so we are pretty much set. Some people seem to use the API here: http://msdn2.microsoft.com/en-us/library/ms190479.aspx but I had no luck with it. |
|
Topic: Technology |
12:56 pm EST, Oct 30, 2006 |
How-To: MySQL as a linked server in MS SQL Server Geplaatst op 2004-06-28 15:47:00 door Reinder 1. Introduction 2. Why do I want to do this? 3. How? 1. Step 1: Create table in SQL Server 2. Step 2: Create an identical table in MySQL 3. Step 3: Create linked server in MS SQL Server 4. Step 4: Create triggers on the SQL Server table 5. Step 5: Insert data into the SQL Server table
INFI Developer |
|
Apple - Mac OS X Leopard Sneak Peek - Xcode 3.0 |
|
|
Topic: Technology |
1:56 am EDT, Oct 23, 2006 |
Track down problems When you need a bit more help in debugging, Xcode 3.0 offers an extraordinary new program, Xray. Taking its interface cues from timeline editors such as GarageBand, now you can visualize application performance like nothing you’ve seen before. Add different instruments so you can instantly see the results of code analyzers. Truly track read/write actions, UI events, and CPU load at the same time, so you can more easily determine relationships between them. Many such Xray instruments leverage the open source DTrace, now built into Mac OS X Leopard. Xray. Because it’s 2006.
Leopard to include DTrace. Apple - Mac OS X Leopard Sneak Peek - Xcode 3.0 |
|
LinuxDevCenter.com -- Userspace Filesystem Encryption with EncFS |
|
|
Topic: Technology |
1:38 am EDT, Oct 23, 2006 |
Userspace Filesystem Encryption with EncFS by KIVILCIM Hindistan 04/14/2005 For a long time now, computer-related theft has been a real problem. The most likely victims of these thefts are laptops and USB sticks, which are obviously very easy to lift (and leave with). Desktop computers and backup media are stolen less frequently. In all of these cases, much of the time, the data stored in the media is more valuable than both the computer and the media. An important question is how to protect valuable data in our computer's storage areas. Woes of Encryption A solution may be to use gpg or similar PKI-based file encryption, but that is still far from transparent and key maintenance is still not very practical. When you consider that you may have to work with several files at a time, this solution becomes even less practical. The immediate solution is to use an encrypted filesystem, which will encrypt all of the data written into the filesystem and decrypt it on the fly when you need to access it. Though this may solve most of the problems, it has performance/privacy trade-offs; the encryption of your latest work may be good, but the encryption of your favorite text editor or your browser's cache files may be unnecessary. There's another partial solution related to partitioning on Linux: having all of the system files on an unencrypted partition and the data files on an encrypted partition. As a best-of-two-worlds solution, this seems to solve both the performance and privacy problems, in theory. However, in real life, having such a partitioning may not be easy; you may not have the rights to repartition a multi-user system, or your hard disk layout may make it very difficult to repartition. The problem is bigger with USB sticks, for you may want to use those sticks to store your private data as well as to exchange some other data with others, probably Windows users. Having a filesystem-wide encryption scheme would subvert that goal. Many projects have tried this classical approach. The most famous are Loopback, CFS, and TCFS. EncFS Related Reading Linux Server Security Linux Server Security By Michael D. Bauer Table of Contents Index Sample Chapter Read Online--Safari Search this book on Safari: Code Fragments only A new and different approach to this problem is EncFS. EncFS runs in userspace, meaning that you do not have to compile kernel modules or have administrative rights. Its most important feature is being able to encrypt not the whole filesystem or partitions, but separate directories. For its simple usage and implementation, on a modern CPU the performance loss is almost negligible, because even a 1.5GHz CPU waits often for RAM or hard disk I/O and has enough power to perform encryption and decryption on the fly. Valient Gough's EncFS page
LinuxDevCenter.com -- Userspace Filesystem Encryption with EncFS |
|
eMpower Lite Rough Cut Demo Video |
|
|
Topic: Technology |
4:53 pm EDT, Oct 12, 2006 |
This is some messed up footage of the application that my company, Lucision, has been developing. It is now done, and this is a video of it in operation. Still have to make it flash, shrink it, and put it on the main page... eMpower Lite Rough Cut Demo Video |
|
Snort - the de facto standard for intrusion detection/prevention |
|
|
Topic: Technology |
10:40 am EDT, Oct 2, 2006 |
This Tech Tip provides straightforward instructions on how to construct and use a passive Ethernet tap. The end product may be used with any hub or switch and any operating system. A passive Ethernet tap is useful when installing an intrusion detection system (IDS) sensor or when snooping Ethernet traffic.
Snort - the de facto standard for intrusion detection/prevention |
|
Topic: Technology |
1:35 pm EDT, Sep 28, 2006 |
AutoRun runs a program when a CD is inserted into a Windows computer - see below for advice on Apple Macs. If Windows finds a (plain text) file called AUTORUN.INF in the root directory of a CD then it follows the instructions in this file to run a program. This example AUTORUN.INF file tells Windows to run program setup.exe (from the root directory of the CD): [autorun] open=setup.exe icon=snazzie.ico
CD AutoRun basics |
|