Bookmarks for 18 feb 2014 from 01:19 to 22:32

These are my links for 18 feb 2014 from 01:19 to 22:32:

  • SubGit :: Svn To Git Migration – What is SubGit SubGit is tool for a smooth, stress-free Svn to Git migration. Create writable Git mirror of a local or remote Subversion repository and use both Subversion and Git as long as you like. Version 2.0 of SubGit introduces support for a remote Subversion repositories, so that to build a Git mirror, no shell access to Subversion repository is required (see complete release notes for a new version). […] You may use SubGit for evaluation purposes without a registration as long as you like. During that evaluation period SubGit will remind you on a necessity of registration with the help of post commit and post receive messages.
  • Apache Tips & Tricks: Deny access to some folders – MDLog:/sysadmin – Applies: apache 1.3.x / apache 2.0.x Required apache module: mod_access Scope: global server configuration, virtual host, directory, .htaccess Type: security Description: How to deny access to certain folders and the files inside them. Useful: to deny access to certain folders containing private information (log files, source code, password files, etc.). The example shown here will address the question posted by Saul Howard on how to deny access to all the subversion directories (.svn).
  • Polipo — a caching web proxy – Wikipedia: Polipo is a lightweight forwarding and caching web proxy server. Polipo is HTTP 1.1-compliant, supports IPv4, IPv6, traffic filtering and privacy-enhancement. To minimize latency, Polipo both pipelines multiple resource requests and multiplexes multiple transactions onto the same TCP/IP connection.[1] Polipo is free software[2] released under the MIT License.[3] It runs on GNU/Linux, OpenWrt, Microsoft Windows, Mac OS X, and FreeBSD. Polipo can be configured to use on-disk cache and serve cached content when offline and perform various forms of content filtering[…] E può usare upstream proxy socks… per chi se ne intende 😉

Bookmarks for 8 nov 2011 from 15:36 to 21:57

These are my links for 8 nov 2011 from 15:36 to 21:57:

  • 10 Ruby One Liners to Impress Your Friends – Someone came up with a list of 10 one-liner examples that are meant to showcase Scala’s expressiveness. A CoffeeScript version quickly emerged, so I thought I’d publish a Ruby one. I find Ruby’s syntax to be a bit cleaner than Scala’s, but the substance (at least as far as these examples are concerned) is relatively similar.
  • Ruby development for system administrators | Linux User – Most Linux and UNIX system administrators use a diverse mix of shell scripts and tools like grep, awk, cut and so on. The classical approach has proven its merits, but these scripts are generally not easy to read or to maintain. One solution is to use a real programming language for system administration tasks. In a complex environment, system administration can become much easier with a real programming language instead of shell scripts. Traditionally, Perl has been very popular among sysadmins, but some people maintain that this is not much better than shell.

    In this article, we choose Ruby, a feature-rich but simple object-oriented programming language known from the popular web application framework Ruby on Rails. T

    [ Ruby! Ruby! Ruby! ]

  • Modern Perl, by chromatic – Onyx Neon Press – Modern Perl is one way to describe how experienced and effective Perl 5 programmers work. They use language idioms. They take advantage of the CPAN. They're recognizably Perlish, and they show good taste and craftsmanship and a full understanding of Perl.

    You can learn this too, whether you've dabbled with Perl for a decade or someone just handed you this book and said "Fix this code by Friday."

  • Useful commands for Windows administrators – Managing a Windows 2000 Active Directory with about 100 servers, over 1500 computers and 35 sites, the following commands often helped me answer questions or solve problems.
    Most commands are "one-liners", but for some I had to make an exception and go to the right directory first.

    These commands could all be used in batch files, though some may need some "parsing" with FOR /F to retrieve only the required substrings from the displayed information.

  • I tool "segreti" per aumentare la sicurezza di Windows – Non tutti sanno dell’esistenza di un set di strumenti che, avviati dalla linea di comando, consentono una gestione puntuale di diversi aspetti di security[…]

    E non solo 😉