Posts

Showing posts from July, 2011

Word 2007: Numbering for Thesis and Dissertation

Image
Well, its for stevens.edu library, but nevertheless, knowledge is knowledge. A reminder to self. /alak

Transmission on a CentOS

Image
So its my time to set up my own Transmission. Yeah, late, but still, yeah.. just leave me alone will yeah. >.< List of references: (1) http://geekery.blog.com/category/linux/transmission-rpms/ (2) https://trac.transmissionbt.com/wiki/EditConfigFiles (3) http://superuser.com/questions/113649/how-do-you-set-a-password-for-transmission-daemon-the-bittorrent-client-server I have a 32-bit Centos 5: [root@chi /]# uname -a Linux chi 2.6.18-238.9.1.el5.pony5-1 #3 SMP Fri Jun 3 16:37:31 PDT 2011 i686 i686 i386 GNU/Linux [root@chi /]# So first i went and download all five of those transmission 2.31 daemon + cli from LINK (1) of my referense list. However, just incase, i mirrored them here : repo.alak.cc/transmission2.31/ Next, as per the instructions, i import the GPG key, and instaled all the RPMs: [root@chi trans]# rpm --import http://geekery.altervista.org/download.php?filename=GEEKERY-GPG-KEY [root@chi trans]# rpm -ivh libevent-2.0.10-1geekery.$(uname -i).rpm Preparing... ...

AIX : Check Process occupying a port

Ripped from here, for my own reminder: http://vistababa.wordpress.com/2008/09/14/which-process-is-using-the-port/ a. Show if the specified is being used. The hex number in the first column of the result is the address of protocol control block (PCB): #netstat -Aan | grep Port_Number b. Dsiplay the process who is holding the socket: #rmsock Address_of_PCB tcpcb Note: That rmsock, unlike what its name implies, does not remove the socket, if the socket is being used by any process. Instead of removing the socket, it just reports the process holding the socket. Also note that the second argument of rmsock is the protocol. It’s tcpcb in the example to indicate that the protocol is TCP. Example: #netstat -Aan | grep 23 f10000f3019c9b58 tcp 0 0 *.23 *.* LISTEN #rmsock f10000f3019c9b58 tcpcb The socket 0x19c9800 is being held by proccess 278614 (inetd). #ps -lp 278614 F S UID PID PPID C PRI NI ADDR SZ WCHAN TTY TIME CMD 240001 A 0 278614 364626 0 60 20 d121a400 468 – 0:00 inetd That's all ...

Wargamesmy 2011 - Binary100

Image
This is a very cilake ayam challenge. kudos to p0pc0rn for guiding me. Steps ==== 1) execute the binary with interval of 1 second. 2) get the strings and order it accordingly by the numbering on most left. 3) Its a fscking ASCHII art! demkit ayam! And where is the fscking flag? Here: Thanks. /alak