tag:blogger.com,1999:blog-27883824558658817612023-12-12T19:48:13.666+02:00AlogosDon Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.comBlogger923125tag:blogger.com,1999:blog-2788382455865881761.post-42108132572656941332015-09-04T09:21:00.000+03:002015-09-04T09:26:27.360+03:00Fix Broken Greek UTF8 <!--<html><br><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><br><body><br> <form action="" method="post">
<br> <input name="my_html_input_tag" value="PILLS HERE"/><br><br> <input type="submit" name="my_form_submit_button" <br> value="Click here for penguins"/><br><br> </form>
<br></body><br></html><br><br><?php<br> $string = $_POST['my_html_input_tag'];<br> <br> echo ($string);<br> echo "<br/>";<br> <br> $string = str_replace( "α", "α", $string );<br> $string = str_replace( "β", "β", $string );<br> $string = str_replace( "γ", "γ", $string );<br> $string = str_replace( "δ", "δ", $string );<br> $string = str_replace( "ε", "ε", $string );<br> $string = str_replace( "ζ", "ζ", $string );<br> $string = str_replace( "η", "η", $string );<br> $string = str_replace( "θ", "θ", $string );<br> $string = str_replace( "ι", "ι", $string );<br> $string = str_replace( "κ", "κ", $string );<br> $string = str_replace( "λ", "λ", $string );<br> $string = str_replace( "μ", "μ", $string );<br> $string = str_replace( "ν", "ν", $string );<br> $string = str_replace( "ξ", "ξ", $string );<br> $string = str_replace( "ο", "ο", $string );<br> $string = str_replace( "Ï€", "π", $string );<br> $string = str_replace( "Ï", "ρ", $string );<br> $string = str_replace( "σ", "σ", $string );<br> $string = str_replace( "Ï„", "τ", $string );<br> $string = str_replace( "Ï...", "υ", $string );<br> $string = str_replace( "φ", "φ", $string );<br> $string = str_replace( "χ", "χ", $string );<br> $string = str_replace( "ψ", "ψ", $string );<br> $string = str_replace( "ω", "ω", $string );<br> $string = str_replace( "Ï‚", "ς", $string );<br> $string = str_replace( "ά", "ά", $string );<br> $string = str_replace( "ή", "ή", $string );<br> $string = str_replace( "ί", "ί", $string );<br> $string = str_replace( "ÏŒ", "ό", $string );<br> $string = str_replace( "Ï", "ύ", $string );<br> //$string = str_replace( "Ï?", "ύ", $string );<br> $string = str_replace( "ÏŽ", "ώ", $string );<br> $string = str_replace( "Α", "Α", $string );<br> $string = str_replace( "Î'", "Β", $string );<br> $string = str_replace( 'Î"', "Γ", $string );<br> $string = str_replace( 'Î"', "Δ", $string );<br> $string = str_replace( "Ε", "Ε", $string );<br> $string = str_replace( "Î-", "Ζ", $string );<br> $string = str_replace( "Î-", "Η", $string );<br> $string = str_replace( "Θ", "Θ", $string );<br> $string = str_replace( "ÎTM", "Ι", $string );<br> $string = str_replace( "Κ", "Κ", $string );<br> $string = str_replace( "Λ", "Λ", $string );<br> $string = str_replace( "Îœ", "Μ", $string );<br> $string = str_replace( "Î", "Ν", $string );<br> $string = str_replace( "Î?", "Ν", $string );<br> $string = str_replace( "Ξ", "Ξ", $string );<br> $string = str_replace( "Ο", "Ο", $string );<br> // p below<br> $string = str_replace( "Ρ", "Ρ", $string );<br> $string = str_replace( "Σ", "Σ", $string );<br> $string = str_replace( "Τ", "Τ", $string );<br> $string = str_replace( "Î¥", "Υ", $string );<br> $string = str_replace( "Χ", "Χ", $string );<br> $string = str_replace( "Φ", "Φ", $string );<br><br> $string = str_replace( "Ω", "Ω", $string );<br><br> // NEEDS TO BE LAST!<br> $string = str_replace( "Î ", "Π", $string );<br> $string = str_replace( "Î", "έ", $string );<br> <br> print ($string);<br> <br>?></p>
<p>
--><a href="http://www.re-compile.com/blog/broken-utf-8-encoding-greek-characters-here-solution-php">http://www.re-compile.com/blog/broken-utf-8-encoding-greek-characters-here-solution-php</a>Don Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.com0tag:blogger.com,1999:blog-2788382455865881761.post-30679578104163049562014-10-17T14:34:00.001+03:002014-10-17T14:36:13.769+03:00Setup your own Linux router using iptables – Part 1 http://www.leaseweblabs.com/2013/12/setup-linux-gateway-using-iptables/Don Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.com0tag:blogger.com,1999:blog-2788382455865881761.post-114020735790329162014-10-15T10:11:00.000+03:002014-10-17T14:35:49.120+03:00How to find largest objects in a SQL Server database?http://stackoverflow.com/questions/2094436/how-to-find-largest-objects-in-a-sql-server-database
Don Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.com0tag:blogger.com,1999:blog-2788382455865881761.post-65150245735699717882014-10-14T09:22:00.000+03:002014-10-14T09:22:09.409+03:00 How to enable the F8 key to start Safe Mode in Windows 8http://www.bleepingcomputer.com/tutorials/enable-the-f8-key-in-windows-8/Don Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.com0tag:blogger.com,1999:blog-2788382455865881761.post-81154779300748165162013-05-21T15:27:00.000+03:002013-05-21T15:27:21.712+03:00Boot Disks & Utilitieshttp://www.spywarewarrior.com/uiuc/soft21b.htmDon Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.com0tag:blogger.com,1999:blog-2788382455865881761.post-65161026549213710102013-04-29T17:30:00.002+03:002013-04-29T17:30:33.299+03:00The LiveCD Listhttp://livecdlist.com/?pick=All&showonly=desktop&sort=Name&sm=0Don Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.com0tag:blogger.com,1999:blog-2788382455865881761.post-46875224813334179932013-04-29T10:16:00.000+03:002013-04-29T10:16:08.662+03:00UNIX Tutorial for Beginnershttp://www.ee.surrey.ac.uk/Teaching/Unix/index.htmlDon Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.com0tag:blogger.com,1999:blog-2788382455865881761.post-57169753432291084662013-04-04T08:45:00.003+03:002013-04-04T08:45:38.899+03:00C and Linux Socket Topicshttp://www.tenouk.com/cnlinuxsockettutorials.htmlDon Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.com0tag:blogger.com,1999:blog-2788382455865881761.post-75864557835581079922013-02-20T16:29:00.003+02:002013-02-20T16:29:30.326+02:00My Top Hacking Toolshttp://gadgetsforall.co.za/my-top-hacking-tools/Don Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.com0tag:blogger.com,1999:blog-2788382455865881761.post-20539330857509235022012-11-20T13:19:00.001+02:002012-11-20T13:19:20.994+02:00Setting limits with ulimitSetting limits with ulimit
By Sandra Henry-Stocker 0 Comments
November 18, 2012, 4:45 PM — Administering Unix servers can be a challenge, especially when the systems you manage are heavily used and performance problems reduce availability. Fortunately, you can put limits on certain resources to help ensure that the most important processes on your servers can keep running and competing processes don't consume far more resources than is good for the overall system. The ulimit command can keep disaster at bay, but you need to anticipate where limits will make sense and where they will cause problems.
It may not happen all that often, but a single user who starts too many processes can make a system unusable for everyone else. A fork bomb -- a denial of service attack in which a process continually replicates itself until available resources are depleted -- is a worst case of this. However, even friendly users can use more resources than is good for a system -- often without intending to. At the same time, legitimate processes can sometimes fail when they are run against limits that are designed for average users. In this case, you need to make sure that these processes get beefed up allocations of system resources that will allow them to run properly without making the same resources available for everyone.
To see the limits associate with your login, use the command ulimit -a. If you're using a regular user account, you will likely see something like this:
$ ulimit -a
core file size (blocks, -c) 0
data seg size (kbytes, -d) unlimited
scheduling priority (-e) 0
file size (blocks, -f) unlimited
pending signals (-i) 32767
max locked memory (kbytes, -l) 32
max memory size (kbytes, -m) unlimited
open files (-n) 1024
pipe size (512 bytes, -p) 8
POSIX message queues (bytes, -q) 819200
real-time priority (-r) 0
stack size (kbytes, -s) 10240
cpu time (seconds, -t) unlimited
max user processes (-u) 50
virtual memory (kbytes, -v) unlimited
file locks (-x) unlimited
One thing you might notice right off the bat is that you can't create core dumps -- because your max core file size is 0. Yes, that means nothing, no data, no core dump. If a process that you are running aborts, no core file is going to be dropped into your home directory. As long as the core file size is set to zero, core dumps are not allowed.
Don Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.com0tag:blogger.com,1999:blog-2788382455865881761.post-8386375955892882512012-03-13T10:16:00.002+02:002012-03-13T10:16:49.728+02:0012 More of the Best Free Linux Books - Part 1 - Linux Links - The Linux Portal Site<a href="http://www.linuxlinks.com/article/20100402190204972/12MoreoftheBestFreeLinuxBooks-Part1.html">12 More of the Best Free Linux Books - Part 1 - Linux Links - The Linux Portal Site</a>: <br /><br /><a href="https://chrome.google.com/webstore/detail/pengoopmcjnbflcjbmoeodbmoflcgjlk" style="font-size: 13px;">'via Blog this'</a>Don Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.com0tag:blogger.com,1999:blog-2788382455865881761.post-29066474461859121752012-02-06T12:13:00.001+02:002012-02-06T12:13:57.823+02:00Cracking Tutorial for Newbies by FlOrEsTaN.<a href="http://www.woodmann.com/crackz/Tutorials/Flores1.htm">Cracking Tutorial for Newbies by FlOrEsTaN.</a>: <br><br><a style="font-size:13px" href="https://chrome.google.com/webstore/detail/pengoopmcjnbflcjbmoeodbmoflcgjlk">'via Blog this'</a>Don Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.com0tag:blogger.com,1999:blog-2788382455865881761.post-83740627339039192612012-01-18T10:33:00.001+02:002012-01-18T10:33:41.583+02:00An Incredible Way to Reveal Passwords Behind Asterisks | Web Talk<a href="http://www.webtlk.com/2010/09/02/an-incredible-way-to-reveal-passwords-behind-asterisks/">An Incredible Way to Reveal Passwords Behind Asterisks | Web Talk</a>: - Sent using Google ToolbarDon Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.com0tag:blogger.com,1999:blog-2788382455865881761.post-71938425039294069122011-10-25T13:23:00.001+03:002011-10-25T13:23:57.258+03:00ΦΤΙΑΧΝΩ ΜΟΝΟΣ ΜΟΥ<a href="http://www.ftiaxno.gr/">ΦΤΙΑΧΝΩ ΜΟΝΟΣ ΜΟΥ</a>: - Sent using Google ToolbarDon Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.com0tag:blogger.com,1999:blog-2788382455865881761.post-83713820612982862582011-07-20T15:01:00.001+03:002011-07-20T15:01:56.304+03:00Downloadable Computer Repair CDs | Technibble<a href="http://www.technibble.com/large-list-of-useful-computer-repair-cds/">Downloadable Computer Repair CDs | Technibble</a>: "- Sent using Google Toolbar"Don Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.com0tag:blogger.com,1999:blog-2788382455865881761.post-21536485533491422752011-07-04T15:56:00.001+03:002011-07-04T15:56:51.981+03:0013 Sites to Download Free eBooks<a href="http://itmanagersinbox.com/1875/13-sites-to-download-free-ebooks/">13 Sites to Download Free eBooks</a>: "- Sent using Google Toolbar"Don Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.com0tag:blogger.com,1999:blog-2788382455865881761.post-22648052716565240262011-05-05T09:57:00.001+03:002011-05-05T09:58:10.210+03:00Maximum PC | Small But Powerful: 30 Useful Apps Under 2MB - Page 4<a href="http://www.maximumpc.com/article/features/small_powerful_30_useful_apps_under_2mb?page=0,3">Maximum PC | Small But Powerful: 30 Useful Apps Under 2MB - Page 4</a>: "- Sent using Google Toolbar"Don Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.com0tag:blogger.com,1999:blog-2788382455865881761.post-16042795912877232332011-05-03T14:13:00.001+03:002011-05-03T14:13:16.535+03:00IBM developerWorks : Java Technology : Open source projects<a href="http://www.ibm.com/developerworks/views/java/projects.jsp">IBM developerWorks : Java Technology : Open source projects</a>: "- Sent using Google Toolbar"Don Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.com0tag:blogger.com,1999:blog-2788382455865881761.post-68860739600609806532011-04-11T16:10:00.001+03:002011-04-11T16:11:12.783+03:00Dailymotion - Debtocracy - a Ταινιες video<a href="http://www.dailymotion.com/video/xhztyb_debtocracy_shortfilms#from=embed">Dailymotion - Debtocracy - a Ταινιες video</a>: "Debtocracy<br /><br />- Sent using Google Toolbar"Don Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.com0tag:blogger.com,1999:blog-2788382455865881761.post-14473636045533610752011-03-21T14:25:00.001+02:002011-03-21T14:25:25.803+02:00Development for Beginners | Tier Three: Windows Development | MSDN<a href="http://msdn.microsoft.com/en-gb/beginner/bb308806.aspx">Development for Beginners | Tier Three: Windows Development | MSDN</a>: "- Sent using Google Toolbar"Don Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.com0tag:blogger.com,1999:blog-2788382455865881761.post-19142701921815878902011-03-02T15:04:00.001+02:002011-03-02T15:04:19.661+02:00How to clone a 1.5Tb disk into a 0.5Tb disk and get away with it. - JustLinux Forums<a href="http://www.justlinux.com/forum/showthread.php?t=152475">How to clone a 1.5Tb disk into a 0.5Tb disk and get away with it. - JustLinux Forums</a>: "- Sent using Google Toolbar"Don Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.com0tag:blogger.com,1999:blog-2788382455865881761.post-62383678850030510522011-03-01T09:23:00.001+02:002011-03-01T09:23:43.256+02:00Main Page - Linux Shell Scripting Tutorial - A Beginner's handbook<a href="http://bash.cyberciti.biz/guide/Main_Page">Main Page - Linux Shell Scripting Tutorial - A Beginner's handbook</a>: "- Sent using Google Toolbar"Don Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.com0tag:blogger.com,1999:blog-2788382455865881761.post-67161554397892976312011-02-28T10:14:00.001+02:002011-02-28T10:15:04.781+02:00Recovering Filesystems from corrupted RAID sets<a href="http://www.unixwiz.net/techtips/recovering-failed-raid.html">Recovering Filesystems from corrupted RAID sets</a>: "- Sent using Google Toolbar"Don Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.com0tag:blogger.com,1999:blog-2788382455865881761.post-82325470614225909492011-02-24T16:05:00.001+02:002011-02-24T16:05:41.943+02:0050 UNIX / Linux Sysadmin Tutorials<a href="http://www.thegeekstuff.com/2010/12/50-unix-linux-sysadmin-tutorials/">50 UNIX / Linux Sysadmin Tutorials</a>: "- Sent using Google Toolbar"Don Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.com0tag:blogger.com,1999:blog-2788382455865881761.post-52231783754713687142011-02-18T17:07:00.001+02:002011-02-18T17:08:00.645+02:00Torrent My Books | Browse, Upload or Search educational textbooks<a href="http://www.torrentmybooks.com/">Torrent My Books | Browse, Upload or Search educational textbooks</a>: "- Sent using Google Toolbar"Don Ardanhttp://www.blogger.com/profile/00898366961246870981noreply@blogger.com0