Firefighters couldn’t help inhaling

Firefighters couldn’t help inhaling – Firefighters who spent half an hour fighting a blaze in which 2,000 pounds of marijuana went up in smoke breathed so much of it that they would have failed a drug test. [Dvorak]
Firefighters couldn’t help inhalingFirefighters who spent half an hour fighting a blaze in which 2,000 pounds of marijuana went up in smoke breathed so much of it that they would have failed a drug test. [Dvorak]
0 Shares:
You May Also Like

Drupal Day 1

So, this is what Day 1 is like. I have a nice theme that I got off the main Drupal site. As you can see its sleep and colorful but not overwhelming. Aside from messing with the general configuration of Drupal, there is a lot more you need to do to make it even remotely functional/organized. Lets take categories for instance. At first I didn't know exactly how these worked. However after some playing around, and further posting. I was able to separate my blog entries and the HOWTO's. I just create a new Category for each, and then provide terms to place them under which is a great feature.

Guide to upgrading Drupal using SSH Commands

A well written guide on how to upgrade Drupal using SSH commands
This guide is meant to augment the official Upgrade guide. Please read the official upgrade steps in UPGRADE.txt as well as in the Drupal.org Dcoumentation thoroughly to ensure that you understand every aspect of the upgrade process. This guide is for more advanced users with SSH experience.

Detect insider threats with Linux auditing

Detect insider threats with Linux auditing -

Organizations of all sizes need to mitigate the risk of insider threats. Misconduct by authorized users represents a grave threat to an organization. According to the 2005 Computer Security Institute and Federal Bureau of Investigation Computer Crime and Security Survey, organizations reported that computer intrusions from inside sources accounted for nearly half of all incidents. You can secure your network perimeter with intrusion detection systems, firewalls, and virus scanners, but don't neglect to monitor authorized users. The Linux Audit daemon can help you detect violations of your security policies.

[Linux.com]