Liking this dubstep remix by Knife Party. Perfect for catching up on work emails. #TechnoTuesdays
Source: SoundCloud / wobblebeats
This weekend I rebuilt our home PVR box which uses SageTV and a couple of Hauppauge TV cards. For the most part, the rebuild went fine but I was reminded of a persistent issue that’s quite annoying: if both cards are enabled, the infrared sensor software (which is needed for the remote to work) gets horribly confused and doesn’t start because it doesn’t know which card to work with.
Perhaps this only affects older cards… or older versions of the IR software. In any event though, I created the following batch file to workaround it by temporarily disabling the card that doesn’t have the remote sensor plugged into it.
Writing this down so I don’t forget. Here’s a MySQL query to show DB size (in MB) for all DB’s on a MySQL server:
SELECT table_schema “Data Base Name”, sum( data_length + index_length ) / 1024 / 1024 “Data Base Size in MB”FROM information_schema.TABLES GROUP BY table_schema ;
The Problem: You need to troubleshoot low-level details concerning a deferred message in SendMail but don’t want to necessarily increase global log levels (or restart services).
The Solution: Use sendmail debug flags/switches. This blog post describes how.
I came across an interesting issue today and want to write down the troubleshooting details before it leaves my brain.
The symptoms involved a generic error in Windows when connecting to a site over SSL:
Revocation information for the security certificate for this site is not available. Do you want to proceed?
Historically, I’ve just clicked yes to this prompt (after verifying the authenticity of the cert of course) but this time, I wanted more information on why exactly Windows couldn’t retrieve revocation details and what it was stumbling over. Unfortunately, the error/alert doesn’t go into this level of detail.
Enter certutil.exe (*cue rock star music*).
This utility does a lot of cool things; not the least of which is testing CRLs and OCSP connections. Here’s how to do that:
1) Bring up Windows command-prompt.
2) Type certutil.exe -URL <specific url to test or path to certificate file you want to extract URLs from>
This brings up a GUI tool you can use to test with:
On the right, you can select what specific revocation resource you want to check. Nifty huh.
You’ll note though that this doesn’t necessarily give us THAT much more information. What about those details I was wanting? That’s where another command comes in…
3) Type certutil.exe -verify -urlfetch <path to certificate file to extract revocation info from>
The result is output like:
Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
———————— Certificate AIA ————————
Verified “Certificate (0)” Time: 4
———————— Certificate CDP ————————
Verified “Base CRL” Time: 6
———————— Base CRL CDP ————————
No URLs “None” Time: 0
———————— Certificate OCSP ————————
Verified “OCSP” Time: 4
Issuer: CN=StartCom Class 1 Server OCSP Signer, O=StartCom Ltd. (Start Commecial Limited), C=IL
5f 3b 69 e7 97 b5 12 f6 33 09 58 92 af f5 4f 7a 30 93 9d 5b
Application = 126.96.36.199.188.8.131.52.1 Server Authentication