I have developers come to me occasionally mystified by this error messages like this: ERROR 1055 (42000): ‘<tablename>.<columnname>’ isn’t in GROUP BY What does that mean, exactly, and why is the query getting kicked back? To illustrate, let’s say we have a tabe, geodata, which has this data for all US cities–the table has just ..
Category : Technology
This will tell you, sorted with most usage at top. for file in /proc/*/status ; do awk ‘/VmSwap|Name/{printf $2 ” ” $3}END{ print “”}’ $file; done | sort -k 2 -n..
aka Setting up DBeaver for use with Redshift. Step by step Setting up DBeaver for use with Redshift is not the most intuitive thing you’ll ever do. A common misconception is that since Redshift is (sorta) built on Postgres, then a Postgres driver is the correct choice. Alas, nope. Here is a quick how-to for setting up DBeaver correctly as possible for Redshift. Here’s the standard DBeaver opening screen Right-click on your Redshift connection and choose “Edit Connection (F4)” That will present you with ..
Windows doesn’t display your PC’s serial number anywhere in its interface, and neither do popular system information tools. But you can often find a PC’s serial number with a simple command, a peek in your BIOS, or on the hardware itself. Run the WMIC Command Open a Command Prompt window to get started. On Windows 10 or 8, ..
The authors argue that the basic length of both generations and turnings—about twenty years—derives from longstanding socially and biologically determined phases of life.[who?] This is the reason it has remained relatively constant over centuries.[80] Some have argued that rapid increases in technology in recent decades are shortening the length of a generation.[81] According to Strauss ..
This requires that metadata lock instrumentation be enabled. UPDATE performance_schema.setup_instruments SET ENABLED = ‘YES’ WHERE NAME = ‘wait/lock/metadata/sql/mdl’; Once that’s in place, you can do this: SELECT ml.object_schema, ml.object_name, p.id, p.user, p.state, ml.lock_type, ml.lock_duration, ml.lock_status, p.time, LEFT(p.info, 100) FROM performance_schema.metadata_locks ml JOIN performance_schema.threads ..
This is a step-by-step tutorial to install Python and Jupyter Notebook to Windows 10 (64 bit). Python 3.3 or greater, or Python 2.7 is required to install the Jupyter Notebook. Download Python 3.7.4 from “https://www.python.org/downloads/release/python-374/” url 2. Choose and select “x86–64 executable installer” for Windows 10–64 bit computer 3. Select location to save the executable ..
How to Install Kubernetes on CentOS 7 (Step by Step) Introduction Small virtual environments, called containers, have become indispensable for developing and managing applications. Working on applications within an isolated container does not affect the host operating system. Containers are more efficient than virtual machines as they do not need their operating system. Kubernetes is ..
Here is the standard mysqldump syntax I always use. This dumps routines and triggers, does so in the most expeditious manner possible, and adds DROP xxxxx statements before all CREATE statements, just in case. It also adds the FORCE parameter in case it runs into issues with views. The “xxxx” at the end can be ..
Web based management interface for ProxySQL: https://proxyweb.org https://github.com/edmodo/proxyw..
MySQL 8.x not only requires that the datadir be empty when initializing, but also the directory designated as the temp directory. If the temp directory is not empty, the –initialize flag will not throw an error as it does if the datadir isn’t clean; rather, it will cause a “Data Dictionary initialization failed” message on ..
https://www.lalal.ai..
https://www.openalpr.com/products..
The screen utility is not included on some server builds. You *have* to have screen or tmux as a DBA or long-running scripts and DML will timeout and the ssh daemon will boot you off the server. As a workaround, I copy the “screen” binary from /usr/bin/screen on a server that does have it installed ..
Make your own vinyl in a variety of styles, with your content. customrecords.com/ho..
Clone Wars – Open source clones of popular sites 100+ open-source clones or alternatives of popular sites like Airbnb, Amazon, Instagram, Netflix, Tiktok, Spotify, Trello, Whatsapp, Youtube, etc. List contains source code, demo links, tech stack, and, GitHub stars count. Great for learning purpose! From https://gourav.io/clone-wars List of 100+ open-source clones Clone Demo Repo Tech ..
Free online photo restoration and colorization – https://hotpot.ai..
FFmpeg is a free and open-source collection of tools for handling multimedia files. It contains a set of shared audio and video libraries such as libavcodec, libavformat, and libavutil. With FFmpeg, you can convert between various video and audio formats, set sample rates, capture streaming audio/video, and resize videos. This tutorial walks you through installing ..
Strip extra crap from recipe sites: https://justthe..
Online no-code application development: https://adalo.com..
iPhone app: What the Font. Finds fonts..
https://procreat..
TikTok how-to tutorial:..
DaVinci Resolve free video editing software: https://www.blackmagicdesign.com/products/davinciresolve/ Review:..
Free Google classes and certification: https://grow.google/..
Screen clipping in Windows 10: Windows – Shift..
Create fonts from your handwriting: https://pretendfoundry.com/fo..
Using an old cellphone as a portable PC system monitor:..
Stupid command line tricks: I often run SQL jobs that can take many days to fully execute, and I always pipe the error and stdout to a file. As such, you end up with lots of lines like this in the output:Query OK, 81218 rows affected (52.76 sec)Here’s a silly one-liner that will quickly total ..
Use conditional formatting in Outlook to highlight emails from certain users or with certain keywords. Via Mike Tholfsen…
IPhone ..
vm.tiktok.com/..
To record, press Windows-G for menu, Windows-alt-R ..
Multi-clipboard how-to…
Finally, an application that works. Portable_O..
Visit the App Store and download P3 Tips to submit secure and anonymous tips. Online at https://www.p3tips.com/823Visit the App Store and download P3 Tips to submit secure and anony..
obspr..
https://www.w3schools.com/howto/howto_css_table..
www.dell.com/community/Laptops-General-Read-Only/I-need-to-replace-the-hard-drive-on-my-Inspiron-17R-N7110-HELP/td..
WebDAV client programs tested with FileRun: Program Name Operating System License Notes Windows Explorer Windows Our opinion: only if you don’t have other options MacOS Finder Mac Our opinion: decent solution Linux Linux Cyberduck Windows Mac Free Our opinion: decent solution WebDrive Windows Mac Free Trial Our opinion: very good! NetDrive Windows Mac Free Trial ..
If you have a Gmail account, you can configure your MTA to relay outgoing mail through Gmail. This gives you the benefit of Gmail’s reliability and robust infrastructure, and provides you with a simple means of sending email from the command line. In this tutorial, we will use Postfix as our MTA. Postfix is a ..
REVOKE ALL PRIVILEGES, GRANT OPTION FROM user [, user] … FLUSH PRIVILEGES; Why the syntax is slightly different from the GRANT command is ..
In attempting to use the mysqldump utility provided with MySQL 8.x against a 5.7 server, you may receive the following error message: mysqldump: Couldn’t execute ‘SELECT COLUMN_NAME, JSON_EXTRACT(HISTOGRAM, ‘$.”number-of-buckets-specified”‘) This is due to the INFORMATION_SCHEMA in 8.0 having more columns to support several new features in 8.x. This error can be silenced by adding the ..
This article will take a look at a few useful ways to modify your ssh_config file to achieve a greater degree of security and control. This post is not about server-side configuration via sshd_config, which deserves its own separate article. What is ssh_config? Some engineers may be surprised by how much of ssh client behavior ..
Since this is an area not everyone has to deal with, I thought a quick one-liner was in order. MySQL can have one of three different binary log formats, which are used to facilitate replication. MySQL masters have binary logging enabled and the binary logs are streamed to all the replicas, where the logs are ..
gron transforms JSON into discrete assignments to make it easier to grep for what you want and see the absolute ‘path’ to it. It eases the exploration of APIs that return large blobs of JSON but have terrible documentation. ▶ gron “https://api.github.com/repos/tomnomnom/gron/commits?per_page=1” | fgrep “commit.author” json[0].commit.author = {}; json[0].commit.author.date = “2016-07-02T10:51:21Z”; json[0].commit.author.email = “mail@tomnomnom.com”; json[0].commit.author.name ..
Problem statement: A rogue application process is sending multiple copies of exactly the same query to the database so you end up with a ton of them DBA charge: (a) write a query that checks for these, and (b) for my own purposes, a quick way to kill the duplicate offenders. — output just the ..
A man is flying in a hot air balloon and realizes he is lost. He spots a man down below and lowers the balloon to shout: “Excuse me, can you help me? I promised my friend I would meet him half an hour ago, but I don’t know where I am.” The man below says: ..
A sample service check, annotated: host_name dbsrp2076 <– name of server service_description SSH <– service being monitored servicegroups PROD-ssh <– service groups is_volatile 0 <– Does this service spontaneously start and stop (always 0 for “no”) check_period 24×7 <– during what hours is this service checked? max_check_attempts 10 <– ..
The attached scripts simple reverse a repliation flow (e.g. serverA –> serverB becomes serverB –> serverA). automate..
MySQL_LoadBalancer_Compa..
What if Windows let you quickly access administrative tools, backup and restore options and other important management settings from a single window? If that sounds good, look no further than the so-called “God Mode.” What Is God Mode? No, God Mode doesn’t unlock any extra secret features in Windows or let you do any tweaking ..
Edit to spec as necessary: DELIMITER $$ CREATE PROCEDURE trimTable() BEGIN DECLARE ROWS INT; DECLARE rows_deleted INT; SET ROWS = 1; SET rows_deleted = 10000; WHILE ROWS > 0 DO DELETE FROM db.tabA WHERE predicate_col < CURDATE() - INTERVAL 90 DAY ORDER BY `id` LIMIT 10000; SET ROWS = ROW_COUNT(); SET rows_deleted = rows_deleted + ..
After you configure all PXC nodes, initialize the cluster by bootstrapping the first node. The initial node should be the one that contains all your data, which you want to be replicated to other nodes. Bootstrapping implies starting the node without any known cluster addresses. If the wsrep_cluster_address variable is empty, Percona XtraDB Cluster assumes ..
Step 1: There were two nasty queries active that wouldn’t cancel/terminate: pid | seconds | user | querytxt ——-+———+—————+—————————————————————————————————— 9315 | 22223 | rsrootuser | /*MTLN-1.37.4 (build 264)*/ + | | | DROP TABLE IF EXISTS “analysis_ready”.”airdna_airbnb_properties” CASCADE 23925 | 14125 | rsrootuser | /*MTLN-1.37.4 (build 264)*/ + | | | select + | | ..
SELECT u.usename, s.schemaname, has_schema_privilege (u.usename, s.schemaname, ‘create’) AS user_has_select_permission, has_schema_privilege (u.usename, s.schemaname, ‘usage’) AS user_has_usage_permission FROM pg_user u CROSS JOIN (SELECT DISTINCT schemaname FROM pg_tables) s WHERE u.usename = ‘tylerbullen’ AND s.schemaname = ‘vacasa’; SELECT u.usename, t.schemaname || ‘.’ || t.tablename, has_table_privilege (u.usename, t.tablename, ‘select’) AS user_has_select_permission, has_table_privilege (u.usename, t.tablename, ‘insert’) AS user_has_insert_permission, has_table_privilege (u.usename, ..
SELECT * FROM stl_scan ss JOIN pg_user pu ON ss.userid = pu.usesysid JOIN svl_query_metrics_summary sqms ON ss.query = sqms.query JOIN temp_mone_tables tmt ON tmt.table_id = ss.tbl AND tmt.table = ss.perm_table_name; SELECT perm_table_name, SUM(ROWS), SUM(bytes) SUM(fetches) FROM stl_scan WHERE starttime >= ‘2018-09-01 00:00:00’ GROUP BY perm_table_name ORDER BY SUM(bytes) DESC..
SELECT namespace AS schemaname, item AS object, pu.groname AS groupname, DECODE( charindex ( ‘r’, split_part ( split_part ( array_to_string (relacl, ‘|’), pu.groname, 2 ), ‘/’, 1 ) ), 0, 0, 1 ) AS SELECT , DECODE( charindex ( ‘w’, split_part ( split_part ( array_to_string (relacl, ‘|’), pu.groname, 2 ), ‘/’, 1 ) ), 0, 0, ..
Save the SQL part as dump_rs_grants.sql, then run this bash bit: cd /usr/local/cron/dump_rs_grants PGPASSWORD=xxxxxxxxx psql -h redshiftFQDN -p 5439 -Uxxxxxx -dyyyyyy < dump_rs_grants.sql > current_rs_grants.txt dump_rs_grants.sql: WITH object_list(schema_name,object_name,permission_info) AS ( SELECT N.nspname, C.relname, array_to_string(relacl,’,’) FROM pg_class AS C INNER JOIN pg_namespace AS N ON C.relnamespace = N.oid WHERE C.relkind in (‘v’,’r’) AND N.nspname NOT IN ..
#!/bin/bash # # Many third-party data sources do lazy character column definitions, making them varchar(65535), which is stoopid. # This little script will read in the DDL for a table, parse out the columns defined like this and then hork out a # SQL script that discovers the actual max length of the actual data ..
#SCHEMA=”${2}” STARTIME=`date` echo “Starting rowcount update at $STARTIME” # fivetran database DBASE=”fivetran” SCHEMALIST=”greenhouse hubspot jira mandrill marketo” # Truncate rollup table echo “Deleting from rollup table for ${DBASE} schema…” PGPASSWORD=xxxxxxxxxx psql -t -h warehouse.vacasa.services -p 5439 -Uvacasaroot -d${DBASE} -n -q -c “TRUNCATE TABLE admin.overall_rowcount;” # Iterate through schemata for SCHEMA in ${SCHEMALIST} do TABLES=`PGPASSWORD=xxxxxxxxxx psql ..
#!/bin/bash ################################################################################# # findlockblocks.sh # # Dead-stupid script that leverages existing RS queries and does a mashup that reports # the current running queries that are blocking others, sorted by time running. # # Nice, simple way to see if there’s actually a problem or if RS is just swamped. # # v1.01 2019-06-14 rlbyrd ..
#!/bin/bash ################################################################################# # do_analyze_by_batch.sh # # Using this query as the source… # # SELECT database, schema || ‘.’ || “table” AS “table”, stats_off # FROM svv_table_info # WHERE stats_off > 5 # ORDER BY 3 DESC, 2; # # …which displays all tables and their stats_off percentage in descending order. # # # Then ..
— Table level permissions SELECT * FROM ( SELECT schemaname ,objectname ,usename ,HAS_TABLE_PRIVILEGE(usrs.usename, fullobj, ‘select’) AND has_schema_privilege(usrs.usename, schemaname, ‘usage’) AS sel ,HAS_TABLE_PRIVILEGE(usrs.usename, fullobj, ‘insert’) AND has_schema_privilege(usrs.usename, schemaname, ‘usage’) AS ins ,HAS_TABLE_PRIVILEGE(usrs.usename, fullobj, ‘update’) AND has_schema_privilege(usrs.usename, schemaname, ‘usage’) AS upd ,HAS_TABLE_PRIVILEGE(usrs.usename, fullobj, ‘delete’) AND has_schema_privilege(usrs.usename, schemaname, ‘usage’) AS del ,HAS_TABLE_PRIVILEGE(usrs.usename, fullobj, ‘references’) AND has_schema_privilege(usrs.usename, schemaname, ‘usage’) ..
select relacl , ‘grant ‘ || substring( case when charindex(‘r’,split_part(split_part(array_to_string(relacl, ‘|’),pu.groname,2 ) ,’/’,1)) > 0 then ‘,select ‘ else ” end ||case when charindex(‘w’,split_part(split_part(array_to_string(relacl, ‘|’),pu.groname,2 ) ,’/’,1)) > 0 then ‘,update ‘ else ” end ||case when charindex(‘a’,split_part(split_part(array_to_string(relacl, ‘|’),pu.groname,2 ) ,’/’,1)) > 0 then ‘,insert ‘ else ” end ||case when charindex(‘d’,split_part(split_part(array_to_string(relacl, ‘|’),pu.groname,2 ) ,’/’,1)) ..
It’s columnar, donchaknow. drop table if exists example.reservation_finance_item_dedupe; create table example.reservation_finance_item_dedupe as (select distinct * from example.reservation_finance_item); select count(*) from example.reservation_finance_item; select count(*) from example.reservation_finance_item_dedupe; drop table if exists example.reservation_finance_item_old; set search_path=example; alter table reservation_finance_item rename to reservation_finance_item_old; alter table reservation_finance_item_dedupe rename to reservation_finance_item; select count(*) from example.reservation_finance_item; select count(*) from example.reservation_finance..
At times it is necessary to repair TCP/IP stack because the links between the layers may become broken. When you try pinging an address, you get a response but still cannot connect to your network or the internet. Start > All Programs > Accessories and right click on “Command Prompt”, select “Run as Administrator” to ..
Most distributions of Linux come with a handy network latency utility called mtr. Thankfully, it is included with the distributions of RHEL we use as well. It’s a combination of ping and traceroute which show each hop of a network path, the time for that hop, and averages/standard deviations. I use it all the time. ..
From screentogif.com: This free tool was (and still is) mainly projected to work as a quick and small screen recorder. If you plan to record hours of fullscreen content, I recommend switching to more advanced software. Recording 📹 ScreenToGif allows you to record part of your screen with the Screen Recorder, also there’s the Webcam ..
Nikto is a very popular and easy to use webserver assessment tool to find potential problems and vulnerabilities very quickly. This tutorial shows you how to scan webservers for vulnerabilities using Nikto in Kali Linux. Nikto comes standard as a tool with Kali Linux and should be your first choice when pen testing webservers and web applications. ..
MySQL 5.7 was the last entry into the MySQL world before 8.x, and it added a dependable multi-threaded replication applier. This article will focus on the performance of the multi-threaded slave applier (MTS), and about its scalability in particular. For those in a hurry, here is a summary of what follows: The multi-threaded applier can ..
#!/usr/bin/env perl # mysqltuner.pl – Version 1.7.9 # High Performance MySQL Tuning Script # Copyright (C) 2006-2018 Major Hayden – major@mhtx.net # Inspired by Matthew Montgomery’s tuning-primer.sh script: # http://forge.mysql.com/projects/view.php?id=44 # # This version further hacked and slashed by rlbyrd off and on since 2009. package main; use 5.005; use strict; use warnings; use diagnostics; ..
— SQL snippet to calculate table fragmentation. SELECT table_schema, TABLE_NAME, ROUND(DATA_LENGTH / 1024 / 1024) AS data_length, ROUND(INDEX_LENGTH / 1024 / 1024) AS index_length, ROUND(DATA_FREE / 1024 / 1024) AS data_free, CONCAT( ROUND( ( data_free / (index_length + data_length) ) * 100 ), ‘%’ ) AS frag_ratio FROM information_schema.tables WHERE DATA_FREE > 0 AND TABLE_SCHEMA ..
#!/bin/bash # Expects: # If no *.last exists, make one. # if one does, diff it and report # Set this manually. Everything else will branch off this. BASEDIR=”/data/backups/ddl/” DBUSER=”svc_dba_adhoc” DBPASS=”ADXEZKZLbgdvcB24nvPu” TZ=”America/Los_Angeles” EMAILTO=”richard.byrd@example.com,mark.butler@example.com,rlbyrd@rlbyrd.com” if [ “$2” == “” ] then echo ” ” echo “USAGE: ddldiff ” echo ” ” fi HOST=${1} SCHEMA=${2} TMPFILE=”/tmp/${HOST}-${SCHEMA}.tmp” /bin/rm ..
Traverses all integer columns checking for capacity limits. #!/usr/bin/env perl #use 5.010; #use strict; #use warnings; # Richard L. Byrd, written sometime in the 90s and improved bit by bit over the next 20 years # # 2009-01-27: While originally written to take a configfile input on the CLI (–configfile=xxxxx.cfg) I’ve hacked # that out ..
Another useful database auditor to quickly find possible issues. Expects user and pass on command line. Currently expects to be executed on the same server as the mysqld process. #!/bin/sh # Another useful database auditor to quickly find possible issues. Expects user and pass on command line. # Currently expects to be executed on the ..
By far the simplest option is for Mac users to install Telnet through Homebrew. If you haven’t done so, go through these steps first: Next, from a termina window, run this command. brew install telnet Hit Return and let Homebrew download and install Telnet to the Mac When installation has complete, you can run Telnet ..
Advanced Mac users may appreciate using the Homebrew package manager, which greatly simplifies the process of installing command line software and tools on a Mac. For example, if you want to easily install favorite command line tools on a Mac like cask, htop, wget, nmap, tree, irssi, links, colordiff, or virtually any other familiar unix ..
To view the existing routes, C:\> route print To add a static route, Syntax: C:\> route add <target> mask <netmask> <gateway IP> metric <metric cost> if <interface> Example: C:\> route add 10.10.10.0 mask 255.255.255.0 192.168.1.1 metric 1 Note: If there is more than one Network Interface and if the interface is not mentioned, the interface ..
Action Arch Red Hat/Fedora Debian/Ubuntu SUSE/openSUSE Gentoo Install a package(s) by name pacman -S yum install apt-get install zypper install zypper in emerge [-a] Remove a package(s) by name pacman -Rs yum remove/erase apt-get autoremove zypper remove zypper rm emerge -C Search for package(s) by searching the expression in name, description, short description. What exact ..
Tomcat–not my favorite. General Steps Create a Key and Certificate Request Issue the Certificate from your favorite Registrar Merge the Certificate into a Tomcat File Create a Key and Certificate Request On your favorite Linux or Windows box, make sure you have OpenSSL. I am making a directory called /home/keystore. Seems fitting. So: mkdir ..
Unfortunately, MySQL does not support the INTERSECT operator. However, you can simulate the INTERSECT operator. Let’s create some sample data for the demonstration. The following statements create tables t1 and t2, and then insert data into both tables. 1 2 3 4 5 6 7 8 9 CREATE TABLE t1 ( id INT PRIMARY KEY ); ..
Executive Summary Advice is seldom welcome. And those who want it most always like it the least. Philip Dormer Stanhope, Earl of Chesterfield (1694-1773) Guiding philosophy of this document: The hero isn’t the developer that battles problems through the weekend, but the one that avoided the problem. Best practices (BP in this document) ..
Make sure you’re using GNU find and GNU sed. find . -type f -exec sed -i ‘s/OLDSTRING/NEWSTRI..
Useful if you feel you’re getting DDOS, flood, or other attacks: netstat -an | grep tcp | awk ‘{print $5}’|sed ‘s/::ffff://’|cut -f1 -d’:’| sort | uniq -c | ..
Some time in your life you’ll run across an Apache server that always has tons of TIME_WAIT connections just seeming to hang out. While these don’t take up as many resources as an ESTABLISHED connection, why keep them around so long? This short article will show you how to identify how many you have, and ..
The “last packet successfully received from the server XXXXX milliseconds ago” errors are virtually always caused by stale connections. There are a number of possible solutions, most having to do with small code changes. Here are things to try to alleviate the issue. I apologize in advance if these have already been tried; I’m shooting ..
Using the AWS console. Login to the AWS Management Console. Navigate to Redshift dashboard at https://console.aws.amazon.com/redshift/. In the left navigation panel, under Redshift Dashboard, click Clusters. Click Launch Cluster button from the dashboard top menu to start the cluster setup process. On the Cluster Details configuration page, enter a unique name for your new cluster ..
Original: How to set up WebDAV hosting on Apache – TechRepublic. WebDAV (Web-based Distributed Authoring and Versioning) is a way to share files over HTTP, much like you would use Samba or NFS. It has more limitations, and less speed, than filesystems like Samba or NFS, but with the proliferation of web servers and the ..
BASH Shell Redirect Output and Errors To /dev/null How do I redirect output and errors to /dev/null under bash / sh shell scripting? How do I redirect the output of stderr to stdout, and then redirect this combined output to /dev/null? You can send output to /dev/null, by using command >/dev/null syntax. However, this will ..
If you, or your clients, are unable to login to your/their email accounts and the system shows this error message: Plaintext authentication disallowed on non-secure (SSL/TLS) connections If you do not want to use SSL/TLS connection to get your email, and to disable SSL/TLS secure connection, do the following: 1. Edit dovecot configuration file: /etc/dovecot.conf ..
Original: How to set up WebDAV hosting on Apache – TechRepublic. WebDAV (Web-based Distributed Authoring and Versioning) is a way to share files over HTTP, much like you would use Samba or NFS. It has more limitations, and less speed, than filesystems like Samba or NFS, but with the proliferation of web servers and the ..
Original: Negotiation: Discovered File(s) Matching Request: None Could Be Negotiated. Posted June 24, 2011 at 9:30 AM by Ben Nadel Yesterday, I lost at least two hours trying to figure out why my local copy of a website was throwing 404 (File Not Found) errors. We had just implemented some URL rewriting on the production ..
This howto page will provide instructions on how to reach services running inside a firewall from outside of the network by using the Putty SSH Client and SSH Port Tunneling. Requirements Download Putty.exe. Port Tunneling Launch Putty. Different categories will be listed on the left side, click on Connection > SSH > Tunnels. Under Add ..
By now, we’re all aware that a utf8 charset and collation is the “right” thing to do, with most folks opting for utf8_general_ci or utf8_unicode_ci. However, lots of installations still default to some form of latin1, which is unfortunate. There are multiple ways to do this, all which functionally do the same thing. Be aware ..
Suppose I try to create a table with a primary key that’s varchar(500), and MySQL complains the key length is longer than the maximum of 1000 bytes. 500 is less than 1000. What’s happening? Plus, a tasty (yet apparently harmless) bug in MySQL. Here’s a statement that will fail on most servers: CREATE TABLE test(c ..
The Linux kernel provides a tweakable setting that controls how often the swap file is used, called swappiness. A swappiness setting of zero means that the disk will be avoided unless absolutely necessary (you run out of memory), while a swappiness setting of 100 means that programs will be swapped to disk almost instantly. Ubuntu ..
There are times when you need to move WordPress around within your server, and times when you need to move WordPress from one server to another. You don’t need to reinstall. WordPress is flexible enough to handle all of these situations. When Your Domain Name and URLs Do Not Change Moving your domain without changing ..
Many people want WordPress to power their site’s root (e.g. http://example.com) but they don’t want all of the WordPress files cluttering up their root directory. WordPress allows you to install it into a subdirectory, but have your blog exist in the site root. As of Version 3.5, Multisite users may use all of the functionality ..
This is a simple script that interactively converts an IP address to its decimal equivalent. This can sometimes be used to bypass web content filtering devices as not all will convert the decimal to an IP and then a hostname. #!/usr/bin/perl # # prompt for an IP print “Enter an IP Address: “; # get ..