Juniper Secure Connect Client
This is posted here for the convenience of SEEI customers. This software is copyright Juniper Networks Windows 64 bit 21.4.12.20 Windows 64 bit 25.4.14.00 Mac 22.3.4.61
Continue reading →This is posted here for the convenience of SEEI customers. This software is copyright Juniper Networks Windows 64 bit 21.4.12.20 Windows 64 bit 25.4.14.00 Mac 22.3.4.61
Continue reading →$ sudo rpm –import https://rpm.opera.com/rpmrepo.key $ sudo tee /etc/yum.repos.d/opera.repo <<RPMREPO [opera] name=Opera packages type=rpm-md baseurl=https://rpm.opera.com/rpm gpgcheck=1 gpgkey=https://rpm.opera.com/rpmrepo.key enabled=1 RPMREPO $ sudo yum -y install opera-stable Tested on Fedroa 34 Reference: https://www.tecmint.com/linux-web-browsers/
Continue reading →edit /boot/config.txt and add this line to the top of the file dtoverlay=pi3-disable-wifi If you also want to disable bluetooth, add this line as well: dtoverlay=pi3-disable-bt https://github.com/guysoft/OctoPi/issues/481
Continue reading →[wordpress_file_upload]
Continue reading →For 3.5″ drives: 6-32 – min penetration 3.0 mm (0.118 inches) – max penetration 3.8 mm (0.149 inches) For 2.5″ drives: M3
Continue reading →Create a new theme with cisco icons First – go to https://www.cisco.com/c/en/us/about/brand-center/network-topology-icons.html Download the PMS 3015 JPG icons. Unzip the file you download into an empty directory From the top menu, select View – Gallery At the top of the … Continue reading →
Ran into a problem where I had an appliance on my network that only supported http: but my chrome browser insisted on going to https: To fix it I had to go to chrome://net-internals/#hsts , scroll down to “Delete domain security … Continue reading →
The following is a way to access the CPU and GPU temperature on a raspberry Pi using SNMP Note – I am using Centos 7 on my Raspberry Pi Edit /etc/sysconfig/selinux change the line: SELINUX=enabled to read SELINUX=disabled Save your … Continue reading →
Intel has come out with a really nice small form factor computer call the NUC. It has 2 USB 2.0 ports and 4 USB 3.0 ports. It is 5.4 x 4.9 x 3.5 inches in size. Bluetooth, wifi and Gigibit … Continue reading →
Compromised web sites can be used to relay spam email. To limit that or track which web sites are being used to send spam, you can limit which users can us sendmail, you can do the following. As root: Create … Continue reading →