How to split back with POSIX standard tools text files that were merged into one single file.
Since Novembmer ‘21 update, Active Directory new conditions may make it raise a CONSTRAINT_ATT_TYPE violation affecting other products.
I’ve been using Gentoo Linux for 20 years. Why? Because I cannot live without Linux and I haven’t found any Linux distribution that I like so much. Here I tell why.
So let me put it clear from the first line: trusting invalid certificates is wrong.
And now I will explain why it’s wrong and why there are few excuses for it.
We are talking here about certificates for SSL encryption, which serves basically two purposes:
Privacy — data is transferred encrypted and can only be decrypted by the intended recipient and not a third party wiretapping the line. Authentication — making sure the receiving end that will be able to decrypt the data is who they claim to be and data is not diverted to a different receiver by a third party with access to manipulating our transfers.
Let's start with a bit of history.
Casim.ir is a URL shortener developed by Nicolas Hoizey in PHP eleven years ago (stylized by then as Cas.im/ir) with the intention of creating a light and simple URL shortener.
About seven years ago, I installed it to create my own private URL shortener at chu.so and some other open and public ones with some modifications on Nicolas's project.
Shortly after, I started contributing to the project with improvements and bugfixes and almost instantly Nicolas gave me direct write permission.
So far, I've been using WordPress for this website. It's a very powerful and complete blogging software, with a lot of plugins, themes, search engine optimizations, etc. It has been in the market for more than 15 years and continues to be actively developed. It's the undisputed leader in blogging and it's very easy and quick to produce content with it.
On the other hand, I haven't updated this blog for two years, with a single entry in the last 5 years.
Every time someone asks if I have heard about Bitcoin or tells me they want to invest, there are so many things that I think I could tell and so many links that I would like to share, that I thought it would be better to compile everything in a blog post. And, what the hell, nowadays you're nobody if you do not have a blog post about Bitcoin and which topic could be better to wake up my blog from its two-year lethargy than the bubble of the moment.
Every time a terrorist attack in the West caught the attention of the media, a response arises from some ideological sectors. Whether the Boston Marathon, Charlie Hebdo or the slaughter yesterday at the Bataclan, there are always those who, after the first signs of media attention, make the same comment:
By the way, terrorist attacks like the Paris one happen almost daily in Africa or Asia, but they don't shock us.
Something that is not unusual to happen: you do bad planning of your disk partitioning and you eventually find out that you have a nearly-full partition and you want to move a directory from that partition to a new disk. If you already have some experience with Linux and command line you will probably know how to safely do this from the same machine and without losing any data, but it may be something a little more difficult for less experienced users.
Precedent 1 Two years ago, I went to Poland to visit a friend who was there for his Erasmus program and there he met a Slovenian girl. English level in Poland is quite low and, in addition, we were in Bielsko-Biała, which is not exactly the capital, so we managed to get understood primarily via the Slovenian girl and the similarities that apparently exist between Polish and Slovenian languages.
One day, we were waiting for the bus to go to Auschwitz and it was quite rainy, so we went into a bar in the deepest Poland that had one of those machines that you put coins so you can choose which song you want to hear.