When I upload a file via SSH to my VPS server with Beeline mobile internet connection, the speed is about 300KB/sec – 800KB/sec:(more…)
Author Archives: superadmin
Installing Jabber Messaging Service on Ubuntu 16.04
sudo apt install ejabberd ufw allow to any port 5280 proto tcp ufw allow to any port 5222 proto tcp ufw allow to any port 5269 proto tcp ufw allow to any port 7777 proto tcp sudo nano /etc/ejabberd/ejabberd.yml
## ## hosts: Domains served by ejabberd. ## You can define one or several, for example: ## hosts: ## - "example.net" ## - "example.com" ## - "example.org" ## hosts: - "developernote.com" ... ###. ==================== ###' ACCESS CONTROL LISTS acl: ## ## The 'admin' ACL grants administrative privileges to XMPP accounts. ## You can put here as many accounts as you want. ## admin: user: - "admin": "developernote.com"
What to mine on GTX 1060 3GB in November 2020
It is still possible to mine the following on GTX 1060 3GB in November 2020:
Compiling QT5.15.0 with OpenSSL support with MSVC2017 on Windows
‘Timestamp for this request is outside of the recvWindow’ error in CCXT
If I use CCXT on my Windows machine I periodically get ‘Timestamp for this request is outside of the recvWindow’ error.
Exchange has the following options by default:(more…)
Accessing a service credentials on Windows 10
I worked on some Windows app that registers a Windows service with a C++ code like this:
SC_HANDLE hService = ::CreateService( hSCM, m_szServiceName, _T(SERVICE_NAME), SERVICE_ALL_ACCESS, SERVICE_WIN32_OWN_PROCESS, SERVICE_AUTO_START, SERVICE_ERROR_NORMAL, szFilePath, NULL, NULL, _T("RPCSS\0"), user_name, password);
where user_name and password are strings that are provided by the app user during the app install. Assuming the service name is MyService this creates a registry key HKEY_LOCAL_MACHINE\SECURITY\Policy\Secrets\_SC_MyService that is hidden by default and even administrator does not have a permission to read it and regedit does not show the content of HKEY_LOCAL_MACHINE\SECURITY key by default. But fortunately the access can be allowed by right clicking on HKEY_LOCAL_MACHINE\SECURITY and selecting Permissions or alternatively by running
in PowerShell. To list the content of the key I used the following command: