Technology Blog
Monthly Archives

May 2014

Server URL Monitoring

I've long used Servers Alive for my URL monitoring. It seems to have occasional application errors when booting from startup on one of my spare staging servers that I almost never keep online anymore. So, it's time to look into some new…

Centos 6 LogRotate Debugging

Not sure if your log rotate patterns in /etc/logrotate.d/* are working as you'd expect, or want to know what a pattern is catching? Then you want logs for your logs (ha). In this case you can troubleshoot by running the built in debug tool:…

Say bye-bye to the old trusty MD5

It is official: Microsoft is one of the big ones who’ll be retiring the venerable-but-vulnerable MD5 algorithm. Don’t worry, you’ll still be able to create MD5 hashes for your documents and verify them, but not for authentication and code…

Don’t Use kill -9

When I was starting out as a sysadmin I would hear and read "don't use kill -9" all the time. But rarely did anyone explain that to do instead. I saw this the other day and liked it. Randal Schwartz, who wrote many of the Perl books those…

Google Launches Panda 4.0

It's official. Panda 4.0 has formally hit the Google search outcomes. The Panda algorithm, which was designed to assist increase nice high quality content material websites whereas pushing down skinny or low-high quality content material…