you can block most of the ads and pop ups from sites by blocking them in local DNS file simply open terminal and edit thisfile $ sudo vi /private/etc/hosts
The problem arises when someone other than me makes a folder in this shared directory. No one but the person who made that folder can write into it, not even
Cairo-Dock is a Mac OS X Dock-like application for Linux and BSD distributions that supports OpenGL and freedesktop standards. It provides a desktop interface for launching applications and accessing running
[root@ajay ~]# traceroute 22.214.171.124 traceroute to 126.96.36.199 (188.8.131.52), 30 hops max, 38 byte packets 1 196-47-64-59 (184.108.40.206) 0.918 ms 0.948 ms 0.652 ms 2 196-47-64-66 (220.127.116.11) 1.223 ms 2.747 ms
The Cape May – Lewes Ferry has confirmed its payment data systems were infiltrated by hackers who took payment card data on certain systems at the Cape May-Lewes Ferry’s terminals and vessels.
Delaware River and Bay Authority(DRBA) that operates the Cape May – Lewes Ferry learned of a possible data breach on July 30 - The same day Jimmy John's learned of the data breach.
The organization with the help of third-party cyber forensic experts has determined that its card processing systems relating to food, beverage , and retail sales only were compromised.
Credit and Debit card data of individuals who have made purchases from September 20, 2013 through August 7, 2014 at the Cape May – Lewes Ferry ’s terminals and vessels at risk.
The malware planted by the cyber criminals has been eliminated. The card data accessed by the malware includes card numbers, cardholder's names and/or card expiration dates.
DRBA is offering free identity protection services, including credit monitoring to affected customers.
Disk Utility failed on Scan image to restore – with error “cannot allocate memory”
This prevent you from creating a Bootable Mac OSX USB Disk, but no fear when Ajay near, here is the solution
Open terminal and make a bootable USB drive using “asr” command – no scanning i trust my Install_ESD file
MacBook:~ ajay$ sudo asr restore -noverify -source </path/to/Install_ESD.dmg> -target /Volumes/USB_Drive -erase
don’t forget to mention -erase at end, and also you are aware that USB drive will be erased to create bootable OSX.
After upgrading to OS X Yosemite, there is a lot of updates needs to be done.
My CS5 manager and Vuze didn’t open as it need Legacy Java 6 Runtime.
with this error – “There is an error To open Vuze, you need legacy Java SE 6 runtime”
Tried upgrading java and didn’t help, after searching and reading i found a solution.
Fix: download java 2014-001 manually with this link and Install
Upgraded to Yosemite, nice design , i liked the look and feel
now client called me to check their X Serv, oops my screensharing Doc icon is missing , it’s just showing a question mark. realise screen sharing is not in System- library-Core services anymore, panic panic panic.. google google nobody had the issue yet.
after spotlight i found it in System-> Library -> Core Services -> Applications
at least spotlight will find it now , before spotlight didn’t know about the hidden applications
The PHP development team has released new versions in order to fix three security vulnerabilities -one of them is said to be a critical one and leads to remote code execution.
The vulnerability identified as "CVE-2014-3669" can cause an integer overflow when parsing specially crafted serialized data with the unserialize ().The vulnerability is only a 32-bit system, but the danger is caused by the breach and that the serialized data often come from user-controlled channels.
In addition, the updates have been corrected errors associated with the introduction of a null byte in the library cURL, calling the damage dynamic memory during processing of the modified data as a function of exif_thumbnail () in image processing (CVE-2014-3670), as well as buffer overflow in the function mkgmtime () from the module XMLRPC (CVE-2014-3668).
These vulnerabilities were discovered by the Research lab of IT security company High-Tech Bridge.
The new versions 5.6.2,5.5.18 and 5.4.34 address these three vulnerabilities.