Using redirection on the UNIX command line.

Using redirection on the command line is very easy to do. The main strength of the UNIX command line is that you may output data from one command-line application to another. Here is one example. ls -hula | lessls -hula | less This is using the pipe character to pipe…

Read More

Confidential Samsung data leaked in a massive breach.

Confidential Samsung data leaked in a massive breach, this includes the content below. DEVICES/HARDWARE -Source code for every Trusted Applet (TA) installed on all Samsung device’s TrustZone (TEE) with specific code for every type of TEE OS (QSEE, TEEGris etc) THIS INCLUDES DRM MODULES AND KEYMASTER/GATEKEEPER! -Algorithms for all biometric…

Read More

Twitch website database contents and software leaked by a malicious agent.

The databases and internal software of the Twitch video streaming platform have been leaked on the Internet. Twitch is an American video live streaming service that focuses on video game live streaming, including broadcasts of esports competitions, operated by Twitch Interactive, a subsidiary of Amazon.com, Inc. This leak includes the…

Read More

Facebook leaked data is not new.

The leaked Facebook data is from 2019, this has been passed around for a long time before this became public. Many accounts may not even be in this, it is nearly 3 years old now. There are 105 countries in this, not 106. But the point is that the data…

Read More

A Data Warehousing solution using SQL Server

I have been researching a system for deploying a database cluster. I have chosen the Microsoft SQL Server product. This does support server clustering and uses nodes clustered together on a network to create a failover network that will automatically maintain operation if one node is to fail. A virtual…

Read More

Discussion of virtualization and database servers.

I have been researching a system for deploying a database cluster. I have chosen the Microsoft SQL Server product. This does support server clustering and uses nodes clustered together on a network to create a failover network that will automatically maintain operation if one node is to fail. A virtual…

Read More