Challenge: one have a local git repo on a Linux server where a big bunch of commit’s have been done. Now one want to put all the files and commits on a remote server, for more easier sharing with other. Here is how it might be done: First create the remote repo. We use gitolite-admin,

If you want to see the http headers from your shell, you can do it with:   wget –no-check-certificate –server-response –spider https://yourwebsite.something The result would be something like: [bash] Spider mode enabled. Check if remote file exists. –2014-02-07 11:13:33– https://yourwebsite.something/something Resolving yourwebsite.something… 129.177.5.226 Connecting to yourwebsite.something|129.177.5.226|:443… connected. HTTP request sent, awaiting response… HTTP/1.1 301 Moved

We had a lot of spam users in our multisite wordpress system. This was because we had self-registration enabled for a period. Not a smart thing to do… anyway, I wrote a bash script in order to find which users id’s from the Mysql database that could potentially be spam users. With this list of

[google-map-v3 width=”350″ height=”350″ zoom=”12″ maptype=”roadmap” mapalign=”center” directionhint=”false” language=”default” poweredby=”false” maptypecontrol=”true” pancontrol=”true” zoomcontrol=”true” scalecontrol=”true” streetviewcontrol=”true” scrollwheelcontrol=”false” draggable=”true” tiltfourtyfive=”false” addmarkermashupbubble=”false” addmarkermashupbubble=”false” addmarkerlist=”uib bergen{}1-default.png{}uib bergen” bubbleautopan=”true” showbike=”false” showtraffic=”false” showpanoramio=”false”]

For those who are running a WordPress site today at May 2013, you should know about this on-going BruteForce attack against many WordPress sites around the world. http://www.bbc.co.uk/news/technology-22152296 Here at University of Bergen, we are also working on to protect our multisite WordPress installation. How is this “attack” performed? There is a so-called “botnet”, where