Browsed by
Category: Uncategorized

Xbox 360 Kinect & Windows 10/11 (slightly different)…Works April 2024

Xbox 360 Kinect & Windows 10/11 (slightly different)…Works April 2024

Xbox 360 Kinect & Windows 10 Buying a second-hand Kinect is a cheap option to get a 3D scanning capable device. Though it is not designed specifically for that purpose it can, using the right application, create a 3D model of an object, a room or a person. I’ve tried several times to install the XBOX 360 Kinect to my Windows PC with no success, but finally, I’ve made it work. Xbox 360 Kinect There is a Windows version of Kinect. It…

Read More Read More

Installing OpenVPN on Amazon FireStick

Installing OpenVPN on Amazon FireStick

PART 1 How to access developer options on Amazon Fire TV? Similar to how you access developer settings on Android Accessing the hidden developer options on Amazon Fire TV, as we mentioned previously, is fairly simple. Here’s how to do it in a few simple steps. Select the gear icon on your Fire TV’s home screen to open Settings. Go to My Fire TV, and select About. Highlight the first option on the list, which is usually your device’s name, and press the…

Read More Read More

HP Printer Firmware Requires Only HP Cartridges (Fix)

HP Printer Firmware Requires Only HP Cartridges (Fix)

HP thinks they own my printer.  The update in 2022 blocked non-HP ink cartridges from being used.  Even though my printer has been using them off and on for over 4 years.  I searched and found this fix for my HP 7740.  https://www.youtube.com/watch?v=cqlmyZ-DQsg&t=90s and the firmware site as of this publishing is Mega Storage Link   Do this at your own risk since you own your printer not me or HP.  I will never buy another HP printer ever!!!

CRON Jobs, Notation and Examples

CRON Jobs, Notation and Examples

Linux Crontab: 15 Awesome Cron Job Examples by SathiyaMoorthy on June 11, 2009 An experienced Linux sysadmin knows the importance of running the routine maintenance jobs in the background automatically. Linux Cron utility is an effective way to schedule a routine background job at a specific time and/or day on an on-going basis. This article is part of the on-going Productivity Tips For Geeks series. In this article, let us review 15 awesome examples of crontab job scheduling. Linux Crontab…

Read More Read More

Checking Oracle Table Stats

Checking Oracle Table Stats

If you do not run stats on Oracle database the performance degrades over time.  The statements below will show the last stats update date/time.  You must change the OWNER to match your schema of course. select min(STATS_UPDATE_TIME) from ALL_TAB_STATS_HISTORY where OWNER = ‘ADMUSER’ select * from ALL_TAB_STATS_HISTORY where OWNER = ‘ADMUSER’ order by STATS_UPDATE_TIME ASC

Verification and Validation

Verification and Validation

The Verification and Validation process areas are similar, but they address different issues. Validation demonstrates that the product, as provided (or as it will be provided), will fulfill its intended use, whereas Verification addresses whether the work product properly reflects the specified requirements. In other words, verification ensures that you built it right; whereas, validation ensures that you built the right thing. (from CMMI-Dev V1.3 Model) Verification is a testing which ensures that the product and product components meets the requirement…

Read More Read More

Wildfly Notes

Wildfly Notes

Everything should be done into your <$JBOSS_HOME>/bin folder: Start Linux: $ ./standalone.sh & Windows: > standalone.bat Stop Linux: $ ./jboss-cli.sh –connect command=:shutdown Windows: > jboss-cli.bat –connect command=:shutdown Restart Linux: $ ./jboss-cli.sh –connect command=:reload Windows: > jboss-cli.bat –connect command=:reload Start in domain mode Linux: $ ./domain.sh & Windows: > domain.bat

KeyTool (Java Keystore SSL)

KeyTool (Java Keystore SSL)

Java SSL (keytool) Import a CA cert into a java keystore keytool -import -file ca-cert.pem -keystore /path/to/keystore -trustcacerts (-trustcacerts is important when adding a CA cert as it will add the CA cert to the keystore trust chain) The root CA cert should be all that’s necessary for Java cert verification; it doesn’t seem to require the intermediate CA certs like OpenSSL does. List the certs in a keystore keytool -list -v -keystore /path/to/keystore     Working with JCE keystores If…

Read More Read More

DER vs. CRT vs. CER vs. PEM Certificates and How To Convert Them

DER vs. CRT vs. CER vs. PEM Certificates and How To Convert Them

DER vs. CRT vs. CER vs. PEM Certificates and How To Convert Them Certificates and Encodings At its core an X.509 certificate is a digital document that has been encoded and/or digitally signed according to RFC 5280. In fact, the term X.509 certificate usually refers to the IETF’s PKIX Certificate and CRL Profile of the X.509 v3 certificate standard, as specified in RFC 5280, commonly referred to as PKIX for Public Key Infrastructure (X.509). X509 File Extensions The first thing…

Read More Read More

Common Java Keytool Keystore Commands

Common Java Keytool Keystore Commands

Java Keytool is a key and certificate management utility. It allows users to manage their own public/private key pairs and certificates. It also allows users to cache certificates. Java Keytool stores the keys and certificates in what is called a keystore. By default the Java keystore is implemented as a file. It protects private keys with a password. A Keytool keystore contains the private key and any certificates necessary to complete a chain of trust and establish the trustworthiness of…

Read More Read More

Project Management

Project Management

Project Management Notes Project Management[1]   1         What is a Project?   1.1        A project is any sort of planned undertaking   All of us have been involved in projects, whether they be our personal projects or in business and industry.  Examples of typical projects are for example: Personal projects: obtain an MBA write a report plan a wedding plant a garden build a house extension Industrial projects: construct a building provide a gas supply to an industrial estate build…

Read More Read More

Adding New OpenStack Roles to an Existing High Availability Cluster

Adding New OpenStack Roles to an Existing High Availability Cluster

Example: Adding New OpenStack or Contrail Roles to an Existing High Availability Cluster This section provides an example of adding new nodes or roles to an existing cluster with high availability enabled. It is organized in the following: Adding New OpenStack or Contrail Roles to an Existing High Availability Cluster Purging a Controller From an Existing Cluster Replacing a Node With a Node That Has the Same IP Address Known Limitations and Configuration Guidelines Understanding How the System Adds a…

Read More Read More

How To Setup SSH Keys on a Linux System

How To Setup SSH Keys on a Linux System

How To Setup SSH Keys on a Linux / Unix System by Vivek Gite on March 9, 2014 last updated October 20, 2016 in CentOS, Cryptography, Debian / Ubuntu, Linux, Openbsd, RedHat and Friends, UNIX I recently read that SSH keys provide a secure way of logging into a Linux and Unix-based server. How do I set up SSH keys on a Linux or Unix based systems? In SSH for Linux/Unix, how do I set up public key authentication? I…

Read More Read More

Linux CHMOD File Permission Secret Coding from the 1970s

Linux CHMOD File Permission Secret Coding from the 1970s

CHEATER CALCULATOR — > http://chmod-calculator.com/ chmod owner|group|world filename Numeric equivalents (octal) based on the table below: 4 read (r) 2 write (w) 1 execute (x) Practical Examples: chmod 400 mydoc.txt read by owner chmod 040 mydoc.txt read by group chmod 004 mydoc.txt read by everyone chmod 200 mydoc.txt write by owner chmod 020 mydoc.txt write by group chmod 002 mydoc.txt write by everyone chmod 100 mydoc.txt execute by owner chmod 010 mydoc.txt execute by group chmod 001 mydoc.txt execute by…

Read More Read More

Recover a forgotten root password on Redhat 7 Linux system

Recover a forgotten root password on Redhat 7 Linux system

Recover a forgotten root password on Redhat 7 Linux Selinux system The way on how you can reset a forgotten root password on a Linux system have not changed for many years. Resetting a root password on RHEL7 Linux system have not change much except that now we deal with SElinux and the system is now using systemd instead of init. Nevertheless, those who have already did reset root password on the Linux system will be with the following steps…

Read More Read More

C# and VB.NET Comparison Cheat Sheet

C# and VB.NET Comparison Cheat Sheet

by Steven Swafford Feedback C# and VB.NET Comparison Cheat Sheet This document is an authorized derivative of Frank McCown’s “VB.NET and C# Comparison” (C) 2005 at http://www.harding.edu/USER/fmccown/WWW/vbnet_csharp_comparison.html This work is licensed under a Create Common License [ Download Word Version or PDF Version ] Comments VB.NET ‘Single line only Rem Single line only C# // Single line /* Multiple line */ /// XML comments on single line /** XML comments on multiple lines */ Program Structure VB.NET Imports System Namespace…

Read More Read More