We had a lot of spam users in our multisite wordpress system. This was because we had self-registration enabled for a period. Not a smart thing to do… anyway, I wrote a bash script in order to find which users id’s from the Mysql database that could potentially be spam users. With this list of

[google-map-v3 width=”350″ height=”350″ zoom=”12″ maptype=”roadmap” mapalign=”center” directionhint=”false” language=”default” poweredby=”false” maptypecontrol=”true” pancontrol=”true” zoomcontrol=”true” scalecontrol=”true” streetviewcontrol=”true” scrollwheelcontrol=”false” draggable=”true” tiltfourtyfive=”false” addmarkermashupbubble=”false” addmarkermashupbubble=”false” addmarkerlist=”uib bergen{}1-default.png{}uib bergen” bubbleautopan=”true” showbike=”false” showtraffic=”false” showpanoramio=”false”]

For those who are running a WordPress site today at May 2013, you should know about this on-going BruteForce attack against many WordPress sites around the world. http://www.bbc.co.uk/news/technology-22152296 Here at University of Bergen, we are also working on to protect our multisite WordPress installation. How is this “attack” performed? There is a so-called “botnet”, where

I had two files that both contained lines that I needed. The final result I wanted was a file called LocalSettings.php that could get the “goodies” from the two other files. The “goodies” here are variable lines containing specific details for a certain Wiki installation. So my first file was called: LocalSettings.php.original The other: LocalSettings.php.upgraded

You can easily access your Windows computer desktop from a Linux computer with the tool rdesktop: [bash]rdesktop -u username -d domainname -k no -f -z -p- host[/bash] where -k no specify that the keyboard is norwegian -z to compress -p- prompt for password before connecting -f full screen (to quit full screen press CTRL-ALT-ENTER) host