$1,050 Free Amazon AWS Credits for Cloud Computing

AWS Security

You can earn up to $1,050 free Amazon AWS credits just by trying out security products in the cloud.

There are two catches:

  1. You must already be an Amazon AWS customer
  2. You need to run each instance for at least 120 hours.

Also, the credits only apply to the following Amazon web services:

  • AWS Data Transfer
  • Unattached Elastic IPs
  • Amazon Elastic Compute Cloud (EC2)
  • Elastic Block Storage
  • Redshift
  • RDS

Read more »

Skadate Face Cropping

I hear a lot of complaints about lack of face cropping in Skadate for profile photos.

How to Make Fake SkaDate Profiles Come to Life

If you have purchased skadate profiles and are looking for a way to get more value from them, try having them automatically sign-in at random times throughout the day. This will give your website the impression of being busy.

Let’s face it, no one likes to walk into a party that is “dead”.

To get the most use out of skadate profiles use a program that automatically generates activity on the site via the false profiles.

Should You Purchase Skadate Fake Profiles

I am often asked if purchasing fake profiles for Skadate is a good idea?

Absolutely!

Almost all online dating sites have fake profiles and sometimes even people utilizing multiple identities.

While this can be viewed as deceptive business practice by consumers, it is actually a great marketing technique to attract more customers and improve upgrade conversion rates.

Should You Buy an Raspberry Pi

Before buying a Raspberry Pi you should first have a game plan of what you will use it for. It should serve specific function and should only be used in a development environment. I have found it is best used to try out media center deployments and even then Andriod based home media centers are fast becoming more popular.

Free SIP Trunk with IP Comms and Asterisk

First, install asterisk on your server

apt-get install asterisk

Edit sip.conf in /etc/asterisk directory to add a sip trunk.

Edit extensions.conf in /etc/asterisk directory to add a phone extension.

IP Comms Configuration

username= *Username*
secret= *secret*
type=friend
insecure=port,invite
host=2way.ipcomms.net
allow=ulaw
dtmfmode=rfc2833
directmedia=no
trustpid=yes

register => username:password@2way.ipcomms.net/username

“What do I do if my asterisk server has a private IP Address in sip_nat.conf or Asterisk SIP Settings in freePBX”

externip=Your external IP
localnet = your local network/ subnet mask (Example: 192.168.1.0/255.255.255.0)
nat=yes

Cyber Grand Challenge Frequently Asked Questions Latest Release

Centerpoint Energy

The latest update from DARPA cyber crime challenge was released on Christmas Eve! Could this possibly support what some of the  conspiracy theorist have been saying about the program.

You can download the latest cyber grand challenge frequently asked questions document.

Never Install VirtualBox on Server Hardware

While I a fan of VirtualBox, it should never be installed on server hardware and ran in a production environment.

I have found that VirtualBox is best installed on beefy computer desktops or laptops and only for the purposes of testing or developing only.

The reasons are simple:

  1. VirtualBox is not a bare-bones hypervisor
  2. Multi-User security is missing
  3. Third-party Web-based management
  4. Confusing Open-source and Proprietary Oracle release

Read more »

Scraping Harris County Arrest Records

I have a website where I provide free arrest records for the public.

A combination of wget and a few lines of bash shell scripting and I’m download records and inserting them into a local MySQL database.

You can find the website at http://www.buckfumble.com.

Mobile Phones as a Collaboration Tool

In my years of IT Management for a global company, I have found that effective collaboration is hard to come by. Meetings are boring, communicating through e-mail is difficult and it is all too easy to get side tracked. Instant messaging is no better and video conferencing is no substitute for face to face meetings.

Most of the time, people just want to be on their phones. Playing games, spending time on Facebook, or Tweeting. It’s a new world and traditional methods of collaborating have been made ineffective.

These days most everyone has or knows how to use a smart phone. I collaborate and socialize with people all over the world via my iPhone and I have found it to be an indispensable tool for communicating and getting tasks done.

The group chat function in my cell phone is the best tool for sharing ideas and keeping everyone in the loop on projects. You can even share photos and links.

If you do decide to use mobile phones as a tool for collaborating be sure to password protect the device in the event of theft or loss.

Follow

Get every new post on this blog delivered to your Inbox.

Join other followers: