Registered since September 28th, 2017
Has a total of 3359 bookmarks.
Showing top Tags within 40 bookmarks
Tag selected: module.
Saved by uncleflo on January 6th, 2019.
This new standard defines three test charts. The new Imatest eSFR ISO module performs a highly automated analysis of the new low contrast (4:1) Edge SFR chart and is available in Imatest Master and Image Sensor 4.0. This chart does not work with the highly automated Imatest eSFR ISO module, described below. For highly automated measurements (including squares near the corners, color patches, and wedges) we recommend one of the Imatest eSFR ISO charts shown below. These charts are fully compliant with ISO 12233:2017. Supported by the Imatest Star Chart module. Optional automatic region detection is available when used with a star pattern that has registration marks on the sides of the image.
sharpness glare sharp wedge automate reflective square module finer diagonal compliant photographic frame conform chart detection recommend enhanced aspect horizontal image requirement compliance corners edge vertical angle contrast test testing photography camera lens iso analysis registration video resolution compare
Saved by uncleflo on November 30th, 2018.
Exciting, interactive modules, built on our next generation e-learning platform. No previous photography experience or fancy camera equipment required! Learn over 70 simple, yet impressive, light manipulation tricks and techniques. Portraits, Landscapes, Weddings, Night shots, photographic editing… it’s all covered! Join us on the creative journey of a lifetime and revolutionise your photography style!
Saved by uncleflo on September 14th, 2018.
The Monetra (MCVE) PHP API, which depends on libmonetra (C API), is designed to take advantage of all three of our "supported” communication methods, which include Drop-File, Unencrypted IP and Encrypted IP (SSL v3/TLS v1.0). Each method has its advantages and will be explained briefly below. Libmonetra is also the basis of the Perl, PHP and JAVA JNI modules, so the usage of those API's is nearly identical to Libmonetra itself, minus language semantics. In addition, this API was designed to be fully thread-safe and allows interleaving of transactions (streaming of transactions with out-of-order responses). The Drop-File communication method is the most simplistic form of communication with Monetra. A transaction directory is specified where .trn (transaction) files are written, "picked up" and .rtn (response) files are written in reply. Advantages are the debug-ability and the fact that it does not require an IP stack to be present on the local machine. Although this method is not designed for networking, it is possible to share the transaction directory via NFS or SAMBA (for windows), to integrate with legacy applications. Because of security concerns, this should not be utilized for new integrations. Newer monetra releases also support client certificate validation which is available in this API. For any feature/anomaly, requests or support questions regarding libmonetra, feel free to contact our support staff via e-mail at email@example.com
Saved by uncleflo on June 23rd, 2017.
Saved by uncleflo on April 12th, 2017.
The modules can be used to add additional functionalities to Centreon. It is possible to install modules using the YUM utility or source files (*.tar.gz). Community modules, under licence GPL v2, developed by the Centreon community; Core modules, under licence GPL v2, developed by the Centreon team; Proprietary modules, subject to a licence, developed by Centreon
Saved by uncleflo on December 9th, 2016.
You want to create a new module for Centreon 2 or to adapt an existing one? You’re at the right place! You should know Centreon contains a page dedicated to the installation and the uninstallation of modules (Administration > Modules). To make the module appears on this page, its directory must be placed inside Cetreon’s modules/ directory.
Saved by uncleflo on October 31st, 2016.
Packaging for ZFS on Linux. Direct wiki edits for most things are welcome, but if you want to make a major change, then please create a new page or fork the wiki repo and submit a pull request.
Saved by uncleflo on March 11th, 2016.
Saved by uncleflo on March 26th, 2015.
SELinux (Security Enhanced Linux) is a Mandatory Access Control system built on Linux's LSM (Linux Security Modules) interface. In practice, the kernel queries SELinux before each system call to know whether the process is authorized to do the given operation. SELinux uses a set of rules — collectively known as a policy — to authorize or forbid operations. Those rules are difficult to create. Fortunately, two standard policies (targeted and strict) are provided to avoid the bulk of the configuration work. With SELinux, the management of rights is completely different from traditional Unix systems. The rights of a process depend on its security context. The context is defined by the identity of the user who started the process, the role and the domain that the user carried at that time. The rights really depend on the domain, but the transitions between domains are controlled by the roles. Finally, the possible transitions between roles depend on the identity.
Saved by uncleflo on March 26th, 2015.
Kernel services for which LSM has inserted hooks and structures to allow access control managed by 3rd party module. SELinux plays an important role during the early stages of system start-up. Because all processes must be labeled with their correct domain, init performs some essential operations early in the boot process to maintain synchronization between labeling and policy enforcement.
Saved by uncleflo on February 22nd, 2015.
Browsers don't have the require method defined, but Node.js does. With Browserify you can write code that uses require in the same way that you would use it in Node.
Saved by uncleflo on February 22nd, 2015.
Nowadays the popular single page applications are everywhere. Having such application means that you need a solid routing mechanism. Frameworks like Emberjs are truly build on top of a Router class. I'm still not sure that this is a concept which I like, but I'm absolutely sure that AbsurdJS should have a build-in Router. And, as with everything in this little library, it should be small, simple class. Let's see how such a module may look like.
Saved by uncleflo on February 8th, 2015.
SWIG is an interface compiler that connects programs written in C and C++ with scripting languages such as Perl, Python, Ruby, and Tcl. It works by taking the declarations found in C/C++ header files and using them to generate the wrapper code that scripting languages need to access the underlying C/C++ code. In addition, SWIG provides a variety of customization features that let you tailor the wrapping process to suit your application.
tools swig java language development program crossplatform crosscompatible inter language build fast efficient power powerful integrate construct script extension module system application interface extend multiple interoperability
Saved by uncleflo on October 11th, 2014.
We need to tell Apache where and what to rewrite. You have two options here - more commonly, you can place the code in a .htaccess file. This is nothing more than a text file which when present in a directory will be interpreted by Apache. You may already be familiar with a .htaccess file, as these allow you set all kinds of server options, e.g. as a custom 404 error page. The other alternative is only available if you have root access and that is to place the code inside your httpd.conf. See load issues for more information. Throughout this tutorial, I am assuming you are using a .htaccess file in the root of your domain (i.e. http://example.com/.htaccess), unless otherwise stated.
module rewrite apache httpd lamp php linux rule condition setup configure guide url htaccess access web server engine host virtual website seo google index text tutorial configuration error link base pattern syntax howto
Saved by uncleflo on August 9th, 2014.
Autopsy® and The Sleuth Kit® are open source digital investigation tools (a.k.a. digital forensic tools) that run on Windows, Linux, OS X, and other Unix systems. They can be used to analyze disk images and perform in-depth analysis of file systems (such as NTFS, FAT, HFS+, Ext3, and UFS) and several volume system types. Examiners and analysts can use the Autopsy graphical interface or The Sleuth Kit (TSK) command line tools to conduct an investigation. Join the sleuthkit-users list to ask questions and help others. Developers can write modules to extend the functionality of both Autopsy and TSK. Refer to the Autopsy Developer's Guide or the TSK Framework Module Writer's Guide for details on how to incorporate your tools into TSK and Autopsy.
opensource sleuthkit forensics data recovery security software tool utility autopsy open source digital investigation linux image indepth analysis system interface html graphical command kit guide development administration module question detail framework incorporate forensic fsck mount information step-by-step wiki howto
Saved by uncleflo on July 19th, 2014.
BTM511 is a Bluetooth Multimedia module with integrated antenna designed for adding robust audio and voice capabilities. Based on the market leading Cambridge Silicon Radio BC05 chipset, these modules provide exceptionally low power consumption with outstanding range. Supporting the latest Bluetooth Version 2.1+EDR specification, these modules provide the important advantage of secure simple pairing that improves security and enhances easy use. The compact size of the modules makes them ideal for battery powered or headset form factor audio and voice devices. With a 16bit stereo codec and microphone inputs to support both stereo and mono applications. The BTM511 modules include an embedded 32bit, 64 MIPS DSP core within the BC05. This allows designers to add significant product enhancements. The availability of 16MB flash memory in the module allows complex functionality to be included.
multimedia component electrical electronics bluetooth module audio antenna technology wireless headset voice provide power consume range distance secure pair device application stereo enhance product complex memory create solder engineering build innovation useful handy idea design diy battery
Saved by uncleflo on March 12th, 2014.
Access websites blocked or censored in your country, company or school with the free Hola Unblocker VPN service. It also lets you access your favorite sites even when you are traveling abroad. ²Hola is a provider of VPN Unblocker technology that provides a faster and more open Internet.
Saved by uncleflo on September 20th, 2013.
The native Linux kernel port of the ZFS filesystem. To get started with ZFS on Linux simply download the latest release and install using the directions for your distribution.
Saved by uncleflo on September 14th, 2013.
Deluges web client is the only client I use, but I wanted to access it via my own web server. This small Howto shows how I got it to work. This has only been tested with Apache 2.2 and Deluge 1.0.0.
Saved by uncleflo on September 12th, 2013.
This article shows how to install and configure mod_security. mod_security is an Apache module (for Apache 1 and 2) that provides intrusion detection and prevention for web applications. It aims at shielding web applications from known and unknown attacks, such as SQL injection attacks, cross-site scripting, path traversal attacks, etc. In the first chapter I will show how to install mod_security on Debian Sarge, Ubuntu 6.06 LTS (Dapper Drake), and on Fedora Core 5, and in the second chapter I will describe how to configure Apache for mod_security which is independent from the distribution you're using. I want to say first that this is not the only way of setting up such a system. There are many ways of achieving this goal but this is the way I take. I do not issue any guarantee that this will work for you!
Saved by uncleflo on September 12th, 2013.
Majordomo 2 is an upwardly-compatible rewrite of the popular majordomo mailing list manager software by Jason Tibbitts and Michael Yount. In this case, "upwardly-compatible" means that there is a fairly easy way to upgrade from majordomo 1. Once you upgrade, the email interface is largely the same, but almost everything else is different. It's better though.
Saved by uncleflo on August 31st, 2013.
The special file /dev/initrd is a read-only block device. Device /dev/initrd is a RAM disk that is initialized (e.g. loaded) by the boot loader before the kernel is started. The kernel then can use the the block device /dev/initrd's contents for a two phased system boot-up. In the first boot-up phase, the kernel starts up and mounts an initial root file-system from the contents of /dev/initrd (e.g. RAM disk initialized by the boot loader). In the second phase, additional drivers or other modules are loaded from the initial root device's contents. After loading the additional modules, a new root file system (i.e. the normal root file system) is mounted from a different device.
Saved by uncleflo on August 30th, 2013.
By default, Gentoo provides a generic, yet tightly controlled policy which is deemed a good start policy for the majority of users. However, the purpose behind a Mandatory Access Control system is to put the security administrator in control. As such, a handbook on SELinux without information on how to write policies wouldn't be complete. In this chapter, we'll talk a bit about the language behind SELinux policies and give some pointers on how to create your own policies, roles, etc.
Saved by uncleflo on August 27th, 2013.
Who’s afraid of SELinux? Well, if you are, you shouldn’t be! Thanks to the introduction of new GUI tools, customizing your system’s protection by creating new policy modules is easier than ever. In this article, Dan Walsh gently walks you through the policy module creation process. A lot of people think that building a new SELinux policy is magic, but magic tricks never seem quite as difficult once you know how they’re done. This article explains how I build a policy module and gives you the step-by-step process for using the tools to build your own.