by admin on 31/01/2013
I was asked how to convert a .ppk private key, from a windows putty, to a .pem file used under linux for ssh access.
Putty (windows) can convert beetween the 2 formats, but you can do in under Linux (debian here, but same for many distros)
first of all, check you’ve Read the rest of this article »
by admin on 27/05/2010
How News Sites Plan to Protect Their Bottom Lines in a World of Ubiquitous Google News Feed
If you have a Google News feed set up for information on a particular subject, how do you know that the Googlebot – the web crawler that goes all around collecting news information like you request, can bring you news from sources that require users to register or pay a fee for being allowed access? Surely Google’s Read the rest of this article »
by admin on 7/10/2009
Why is a Cisco Certification such a Gold Standard ?
It is a basic and effortless reality – employers trying to hire new workers want even more capability, more talent and significantly more qualifications for his or her revenue. In terms of choosing IT assistance workers, one-trick ponies not charm the employer. You will need absolutely dazzling skills on the desktop, with Read the rest of this article »