Search This Blog

Thursday, January 31, 2013

Try JRebel: Win A Prize


   

zeroturnaround
Try JRebel & Win!
Kindle Paperwhite & other cool prizes

Hello Tiodor,

ZeroTurnaround is giving away a Prize per Day from now until Valentine's Day!  Each day between now and February 14, 2013 that we reach 100 registrations we will give away an awesome prize such as a Kindle Paperwhite, a Keurig DeskPro coffee maker, some really cool board games - and even a can of Unicorn meat. Register your JRebel Trial today to be entered to win.  Put an end to redeploys, get a cool prize!



Good luck & Happy Coding!

Oliver

--
Oliver White
Prize Guy
ZeroTurnaround
 





Another chance to Win!  After you register your trial, forward this email to a friend.  Once they register you will be entered to win a Bose SoundDock.  The contest to win the Bose SoundDock activates once we reach 100 unique registrations. Whoever refers the most people who try JRebel will win. The more you refer, the better your chance of winning so be sure to share with your family, friends, co-workers, and everyone else!

Limited Time Offer. JRebel Trial must be activated by 11:59PM EST on February 14, 2012. One entry per person. All information on JRebel Activation Form must be accurate & valid. Must be working in Java Development. All submissions will be contacted by phone to confirm identity & accuracy of information prior to being eligible for the giveaway. Winner will be notified by phone and/or email.



ZeroTurnaround, 545 Boylston, 4th floor, Boston MA 02116
Contact Us

If you no longer wish to receive these emails, click on the following link: Unsubscribe

About two eth alias in single ethernet !!!

Hello everybody:

Enybody can tellme how to setup al eth alias (like eth0:0) in a debian
box with a sigle ethernet?

Thanks


--

Este mensaje le ha llegado mediante el servicio de correo electronico que ofrece Infomed para respaldar el cumplimiento de las misiones del Sistema Nacional de Salud. La persona que envia este correo asume el compromiso de usar el servicio a tales fines y cumplir con las regulaciones establecidas

Infomed: http://www.sld.cu/


--
To UNSUBSCRIBE, email to debian-firewall-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: http://lists.debian.org/5DFEE4AFB65841519826A7846A828964@programing

Super Bowl Bust: US takes down 313 websites, snags $13.6M in counterfeit NFL merchandise

  9 iPhone-iPad Apps That Invade Your Privacy, and 1 That Doesn't | Business websites spread more malware than porn sites, Cisco says
 
  Network World After Dark

Forward this to a Friend >>>


Super Bowl Bust: US takes down 313 websites, snags $13.6M in counterfeit NFL merchandise
In what is becoming as much a tradition as the Super Bowl itself, federal law enforcement officials, in conjunction with the NFL, said today they snatched up $13.6 million in fake merchandise shuttered 313 websites as part of a third-annual sting against NFL-related counterfeit items dubbed Operation Red Zone. Read More


RESOURCE COMPLIMENTS OF: IDG Research

New Survey: Purchase Process of Enterprise Technologies
Tell us about the buying process for enterprise technologies in Network World's Technology Influence Survey! This survey should take about 10 minutes of your time. To thank you, you will have the opportunity to enter a sweepstakes to win a $250 cash prize*! Please be assured your responses are confidential. To participate, click on the link below. *Due to regulations, prize sweepstakes is only open to legal U.S. and Canadian (except Puerto Rico and Quebec) residents, age 18 or older.

WHITE PAPER: McAfee

The Risks of Social Media & What Can Be Done to Manage Them
Learn about the risks and rewards of social media when used in a corporate setting along with the need for detailed use polices, technology to enforce those policies, and monitoring and archiving. Read Now

9 iPhone-iPad Apps That Invade Your Privacy, and 1 That Doesn't
Most iPhone and iPad apps appear harmless and fun, but don't fall for them. Some apps are virtual Trojan horses that swipe personal data when you're not looking. Appthority has put together a list of some of the worst offenders and you may be shocked to learn that a couple of the most popular apps made the list, such as Facebook and Angry Birds Star Wars. Be sure to check out the app at the end of the list for the one most honest. Read More

Business websites spread more malware than porn sites, Cisco says
Malware is more likely to come from advertisements on seemingly legitimate sites than on those previously thought to be more dangerous, such as adult content sites or those offering illegal pharmaceuticals, Cisco said in its recently released Annual Security Report [PDF]. Read More

FTC's $50,000 Robocall Challenge nets 744 ideas to shut down robocallers
The Federal Trade Commission today said the submission period for its Robocall Challenge had ended and it got 744 new ideas for ways to shut down the annoying automated callers. The FTC noted that the vast majority of telephone calls that deliver a prerecorded message trying to sell something to the recipient are illegal. The FTC regulates these calls under the Telemarketing Sales Rule and the Challenge... Read More

If the 49ers and Ravens Were Tech Companies ...
Are the red-hot 49ers the Samsung of football? Is Apple the tech version of the Patriots? Do Microsoft and the Cowboys share the same fate? With Super Bowl Sunday coming this weekend, we've been thinking about NFL teams and tech companies that have had similar histories, expectations, triumphs and defeats. Here's our list. Read More

Office 365 vs. Office 2013: Should you rent or own?
For the first time Microsoft is tempting Office users to rent, not own, software that for decades they've bought as a standalone program. It's not a foreign proposition. We pay annual subscription fees for our anti-virus software. Last April, Adobe rolled out its Creative Cloud subscription package for renting Photoshop, Illustrator, and Dreamweaver. Read More

12 Common IT Hiring Mistakes and How to Avoid Them
Bringing a new employee into your IT department has the potential to make or break your team. Avoid these common hiring mistakes and build a team of IT pros that fire on all cylinders. Read More

Apple and Google have nothing to fear from BlackBerry 10 -- but Microsoft does
Hands-on review: BlackBerry 10 is a big step up, but it's awkward to use in some key areas Read More

F5 introduces new integrated firewall capability for the data center
F5 Networks today rolled out a raft of new and more powerful Application Delivery Networking tools, including its most capable device to date, the Viprion 4800, and an advanced firewall that, when deployed on the 4800, is said to offer industry leading performance. Read More

Cisco pushes ahead with context-aware security vision
Cisco made two significant security announcements at its Cisco Live conference in London this week, reiterating its commitment to offering an integrated platform for defense, discovery, and remediation of threats. Read More

Hacker 'sextorted' 350 women into stripping off after stealing embarrassing pictures
The FBI has arrested a man accused of stealing personal information from the online accounts of 350 women in order to 'sextort' them into stripping off so he could take nude pictures via webcam. Read More

First Look: BlackBerry 10 smartphones
Our initial glimpse at RIM's (er, make that BlackBerry's) attempt to claw its way back into the smartphone market Read More

 
 
 

SLIDESHOWS

13 markets you might not associate with Cisco

Cisco's "Internet of Everything" initiative takes it into unchartered territory.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. NASA: Feb. 15 asteroid fly-by will buzz Earth closer than many satellites

2. Microsoft embraces open-source Git for development tools

3. Jailed for jailbreaking: The new law could land you in the slammer

4. Office 365 vs. Office 2013: Should you rent or own?

5. 13 awesome and scary things in near Earth space

6. First Look: BlackBerry 10 smartphones

7. IBM security tool can catch insider threats, fraud

8. iPhone killer BlackBerry 10 is here: iPhone is dead!

9. Cisco's moves show clear signs of future shift in philosophy

10. 12 free cloud storage options

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

Re: About two eth alias in single ethernet !!!

On 02/01/2013 04:17 AM, Lic. Néstor Rodríguez-Triana Domínguez wrote:
> Hello everybody:
>
> Enybody can tellme how to setup al eth alias (like eth0:0) in a
> debian box with a sigle ethernet?

One way doing it if you are looking for mutiple ipnumbers on eth0


cat /etc/network/interfaces
# This file describes the network interfaces available on your system
# and how to activate them. For more information, see interfaces(5).

# The loopback network interface
auto lo
iface lo inet loopback

# The primary network interface
auto eth0

iface eth0 inet static
address xx.xx.xx.11
netmask 255.255.255.0
network xx.xx.xx.0
broadcast xx.xx.xx.255
post-up /etc/firewall/eth0_route_up
pre-down /etc/firewall/eth0_route_down
gateway xx.xx.xx.1
# dns-* options are implemented by the resolvconf package, if installed
dns-nameservers xx.xx.yy.11
dns-search xxx.se

cat /etc/firewall/eth0_route_up
#!/bin/bash
ip a add xx.xx.xx.12/24 dev eth0
ip a add xx.xx.xx.13/24 dev eth0


cat /etc/firewall/eth0_route_down
#!/bin/bash
ip a del xx.xx.xx.12/24 dev eth0
ip a del xx.xx.xx.13/24 dev eth0


// Björn M.


--
To UNSUBSCRIBE, email to debian-firewall-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: http://lists.debian.org/510AD175.1070609@bjorn-helena.se

Canadian game developer fired after spoofing call-center workplace

Hot or not: 10 tech trends for 2013

F5 introduces new integrated firewall capability for the data center

Network World Daily News PM
January 31, 2013
Share this email

Canadian game developer fired after spoofing call-center workplace

An independent game developer recently got fired from his day job at the Canadian Revenue Agency after releasing a satirical depiction of his apparently aggravating and unfulfilling call-center job.

READ MORE
 

Issue highlights

1. Hot or not: 10 tech trends for 2013

2. F5 introduces new integrated firewall capability for the data center

3. New IPv6 training video released

4. New York Times computer network breached by Chinese hackers, paper says

5. INSIDER How to manage big data overload

6. What will an H-1B cap hike bring to U.S.?

7. Microsoft to big data programmers: Try F#

8. Ubuntu's rolling release: Pros and cons

9. Whatever happened to the art of software testing?

10. The 12 techiest Super Bowl ads of all time

RESOURCE COMPLIMENTS OF: Google

Google Apps for Business

Do more for less with your team using Google Apps. Custom web-based email, calendars, and documents to easily share & work together in the cloud. Start with a free 30-day trial!

Hot or not: 10 tech trends for 2013

Breakouts and busts: Here's the lowdown on this year's sizzlers and fizzlers in tech READ MORE

F5 introduces new integrated firewall capability for the data center

F5 Networks today rolled out a raft of new and more powerful Application Delivery Networking tools, including its most capable device to date, the Viprion 4800, and an advanced firewall that, when deployed on the 4800, is said to offer industry leading performance. READ MORE

RESOURCE COMPLIMENTS OF: BYOD & Mobile Device Management Tech Seminar

Final Day to Register! BYOD & Mobility Management

Attend and learn how to use your organization's appetite for risk as the foundation of your enterprise mobility management policy. BYOD & Mobility Management Tech Seminar. 2/12 - Westin Hotel, Long Beach, CA Click to continue

New IPv6 training video released

Seeing an uptick in demand for IPv6-trained engineers in Europe, IT video training firm CBT Nuggets is offering a new 21-hour class aimed at teaching the basics of the next-gen Internet protocol. READ MORE

RESOURCE COMPLIMENTS OF: IDG Research

New Survey: Purchase Process of Enterprise Technologies

Tell us about the buying process for enterprise technologies in Network World's Technology Influence Survey! This survey should take about 10 minutes of your time. To thank you, you will have the opportunity to enter a sweepstakes to win a $250 cash prize*! Please be assured your responses are confidential. To participate, click on the link below. *Due to regulations, prize sweepstakes is only open to legal U.S. and Canadian (except Puerto Rico and Quebec) residents, age 18 or older.

New York Times computer network breached by Chinese hackers, paper says

Hackers from China breached the computer network of The New York Times and stole passwords that allowed them to gain access to computers and email accounts for a period of four months, the newspaper reported late Wednesday. READ MORE

WHITE PAPER: Netscout Systems Inc.

Service-Oriented Performance Management Strategy

This white paper is to help IT organizations adopt a management methodology that enables them to improve the user experience by focusing on service delivery management. Learn More.

INSIDER

How to manage big data overload

The nuts and bolts of systems designed for storing petabytes (and more) of data that can be easily accessed and analyzed are more complex than the inner workings of your average storage platform. Here's how to handle the data deluge. READ MORE

What will an H-1B cap hike bring to U.S.?

Ten U.S. senators this week agreed to sponsor a bill that would allow the annual H-1B visa cap to rise to as high as 300,000, leaving opponents and some researchers concerned. READ MORE

Microsoft to big data programmers: Try F#

Microsoft's F# language geared to parallel programming, data-oriented problem-solving READ MORE

Ubuntu's rolling release: Pros and cons

According to Canonical's Kernel Team Manager, Leann Ogasawara, it is possible that Ubuntu will get rid of the current "new release every six months" model and move to a rolling release. (You can find more info in this recent video.) So, just what is a "rolling release"? READ MORE

Whatever happened to the art of software testing?

Over the last year I've had the opportunity to attend a number of extremely interesting and mind-expanding conferences focusing on emerging and somewhat disruptive technologies and companies: APIs, mobile, cloud, big data – the works. Coming from a quality background, it has stricken me how little focus these companies give to testing. They talk plenty about continuous integration, agile methodologies,... READ MORE

The 12 techiest Super Bowl ads of all time

The Super Bowl is the time for football, and commercials – increasingly geeky ones. READ MORE

SLIDESHOWS

13 markets you might not associate with Cisco

Cisco's "Internet of Everything" initiative takes it into unchartered territory.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. NASA: Feb. 15 asteroid fly-by will buzz Earth closer than many satellites

2. Microsoft embraces open-source Git for development tools

3. Jailed for jailbreaking: The new law could land you in the slammer

4. Office 365 vs. Office 2013: Should you rent or own?

5. 13 awesome and scary things in near Earth space

6. First Look: BlackBerry 10 smartphones

7. IBM security tool can catch insider threats, fraud

8. iPhone killer BlackBerry 10 is here: iPhone is dead!

9. Cisco's moves show clear signs of future shift in philosophy

10. 12 free cloud storage options

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **