rsnapshot: Auto Version Controlled Backup for Unix/Linux/Mac/BSD…
Red Had Enterprise Linux (RHEL) 6. I missed the ease of configuration and all the free tools that people smarter than me have created. I would like to do a fast post on rsnapshot. I have seen ssh and rsnapshot scheduled in cron to automate backups of OSX to a … Continue reading →
Java | Constructor vs. Method
If you are within your first year of application development in Java you may have asked yourself this question. I know I did. What is the difference? Here is a reference list that I have compiled for your convenience. Download the excel file and build upon other comparisons you need … Continue reading →
Critical Chain Safety
Safety is a necessary CYOA mentality that most project managers need projects can finish on time. Trying to balance time management with resources needed is what it is all about and can be summed up in 3 steps; planning, execution, and monitoring. 1. Planning: Two durations are entered for each … Continue reading →
Cyber Crime: Risk Assessment
Cyber Crime: A Clear and Present Danger This is the excel file used for this post –> Risk-Registry.xlsx Information systems give great ways to communicate and learn, but also allow nefarious others access to exploit the power of the Internet for terrorist and/or criminal purposes. Criminal warfare has moved to … Continue reading →
Going Back to School
This post informs of academic progression at college and the steps necessary to start, graduate and move on to a better job. Price of College Increases Every Year Before you can take any classes you really have to decide if you are in it for the long haul. If … Continue reading →
Sources of Data for Business intelligence
Raw data on its own is not very useful, it is just stacks of symbols, sounds, pictures, numbers or words. After data is collected the ability to connect the data, to give it relational meaning is when data becomes useful information. Information can answer questions of who, what, when and … Continue reading →
Open Source Software in Digital Forensics
The purpose of this research paper is to research information on open source digital forensic tools that are assess-able for free, usually online. To review types of digital forensic tools available and what they do. The basic definition of what open source and digital forensics is will be defined, and … Continue reading →
iTunes Restoring iPhone on Windows 10 | Error 4010
In order to restore my iPhone. For steps to fix error: “Unknown Error” 4010. None of the solutions worked. Except this. DON’T DOWNLOAD iTunes FROM THE MICROSOFT STORE. A step is skipped where you cannot accept the ULA. You are not even given the prompted to accept. Easiest way to tell … Continue reading →
Enhance VIM
While VI has been used for years, in current Linus & iOS systems a lot of people have resorted to using Vim. There are a lot of tricks to Vim that can make it easier to use. Some may not be active by default and I wanted a chance to … Continue reading →
Risk Management Planning
Risk Management Plan Risk Management Planning Risk management typically follows four stages in an iterative process. These are identification, assessment, planning and monitoring. They should be followed at project start-up and then monitored in response to change, completion of project stages. One of the main reasons why risk-management activities fail … Continue reading →