Webcast to MySQL Strategie of Oracle

Sounds good to me what Oracle are trying to do to improve MySQL. Hopefully it is also true what they are saying about their commitment to Open Source.

The strategy according to Edward Screven is „Complete. Open. Integrated.“ Oracles overall strategy.

There is a look at the MySQL 5.5 beta. [[InnoDB]] will become default. [[MyISAM]] will still be supported though.

Schutz vor DLL-Lücke in Windows-Programmen

bevor Ihr jetzt sagt, dass interessiert mich doch einen Scheiß und lass mich doch mit so einem Müll in Ruhe, lest bitte weiter.

Das trifft alle Windows Nutzer! Also auch Eure Kisten zu Hause. Meine Einschätzung ist, dass diese Sache nicht auf die leichte Schulter zu nehmen ist und Ihr das für Euch als Privatperson das umgehend umsetzen solltet. Eine Anleitung gibt es auch [1]. Dort ist auch ein offizielles Video von M$ verlinkt.

Checkliste ist:

  1. den Dienst deaktivieren
  2. die Ports in der Firewall blocken
  3. und den Wert in die Registry schreiben (HKEY_LOCAL_MACHINE ist in dem chip Artikel abgekürzt durch HKLM und das ist auch für mich unverständlich gewesen)

[1] Schutz vor DLL-Lücke in Windows-Programmen

Conditional tags in WordPress

You would like to know what type of page you are on? A list view or single view? Conditional Tags

<?php if (!empty($post->post_excerpt) &! is_single()) : ?>
        <?php the_excerpt(); ?>
        <p><a href="<?php the_permalink() ?>" rel="bookmark" title="Permanent Link to <?php the_title(); ?>">Read the full post »</a></p>
<?php else : ?>
        <?php the_content(__('(more...)')); ?>
<?php endif; ?>

Weblinks

CSS Backgrounds and Borders Module Level 3

-moz-border-radius is not the solution but which browsers support the new CSS3? border-radius is what we want! The specification is here we just need the browsers to implement it. Internet Explorer does not up to version 8.

Bug in mod_php: DNS cached after change

After a change of Domain Name Server (in /etc/resolv.conf) it seems to be necessary to stop and start the Apache server. A simple restart will not do. I have not done any tests on which versions of Apache and mod_php are affected.

This weblog encountered the problem which showed in WordPress plugin Akismet. Nice job that the programmers of Akismet have done. Not only do they show an error message but they provide you with first step diagnostic tools and with a page of further reading.  The best hint I got from the latter was that php methods/functions fsockopen and gethostbynamel must work flawlessly.  So I created a file with the following code on my server:

<?php
echo '<h1>fsockopen(rest.akismet.com, 80, $errno, $errstr);</h1>';
$r = fsockopen('rest.akismet.com', 80, $errno, $errstr);
var_dump($r);
var_dump($errno);
var_dump($errstr);
echo '<h1>fsockopen(google.com, 80, $errno, $errstr);</h1>';
$r = fsockopen('google.com', 80, $errno, $errstr);
var_dump($r);
var_dump($errno);
var_dump($errstr);
echo '<h1>gethostbynamel(rest.akismet.com);</h1>';
$t = gethostbynamel('rest.akismet.com');
var_dump($t);
echo '<h1>gethostbynamel(google.com);</h1>';
$t = gethostbynamel('google.com');
var_dump($t);
?>

Executing it from shell will work fine. But you must execute it in the Apache Webserver context meaning you need to call the script in your browser calling the server URI via http://YOUR_HOST/YOUR_PATH_TO_SCRIPT/YOUR_SCRIPTNAME.php

Further reading:

  • bytes.com php_network_getaddresses: getaddrinfo failed

Hacked computers spamming apache server log

If you find the following in the error.log of an apache webserver:

… [error] [client XXX.XXX.XXX.XXX] client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23): …

You can be sure that in most cases it is a computer, largely even running a webserver and many other services, with no firewall, lacking security precautions, xampp and phpmyadmin open to everybody, empty passwords, etc. sometimes they have all of these features at once. I have not checked for viruses but I expect most of them to even be infected or at least hacked and working for someone else than they ought to.

It is most likely that they send the request to your web server without the owner knowing about this. But one thing is for certain:

  1. It causes traffic
  2. Costs energy
  3. Spams your logs
  4. Etc. etc.

And all this because the computer administrator/owner has not made an effort to secure the computer at a minimum.
Go to your apache log directory an check if the same is happening to you using the following commands:

less error.log | grep RFC2616 | awk ‚{print $8}‘ | sort | uniq
less error.log | grep RFC2616 | awk ‚{printf(„%s %s %s\n“, $3, $4, $8)}‘

Further reading: