Joomla 3 Part B

Epsilon Weblog

This is the 2nd installment in my blog post series about Joomla 3 based on the video training course I am studying with Addison-Wesley. If you click content/new article it lets you post a new article. If you fill in the article details and select a relevant category it links to that category. Obviously by article details I mean heading and text. If you type an article in notepad it contains less formatting information than many programs and if you click the html button you will see cleaner code. I would suggest use gimp to edit your photos before going on the website. It’s at . It’s free and there is a tutorial on using it on this site. It’s also just as powerful as photoshop. If you go into global configuration and choose toggle editor it lets you copy and paste html which can be something like the…

Voir l’article original 146 mots de plus

Joomla 3 Part C

Epsilon Weblog

This is the 3rd installment in my blog post series on Joomla 3 which is based on what I learn from the Addison-Wesley video training course. You can have an alias like automate having it say you have written an article for example. To do this click batch then select. You then scroll down to the bottom box which has various categories and has move and copy under each category. Move deletes the original where as copy copies it. The extensions are found under the extension menu. The most commonly used ones are there.  A joomla site is made up of things like extensions, modules & components. You can find more extensions which extend the usuability of your joomla site at . A lot of these are free but some are ones you must buy. Sometimes there is a free version with limited features and one you buy that…

Voir l’article original 207 mots de plus

NSA’s secret MYSTIC system is capable recording 100% of foreign country’s telephone calls



WASHINGTON, D.C. – The United States National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden.A senior manager for the program compares it to a time machine – one that can replay the voices from any call without requiring that a person be identified in advance for surveillance.

The voice interception program, called MYSTIC, began in 2009. Its RETRO tool, short for “retrospective retrieval,” and related projects reached full capacity against the first target nation in 2011. Planning documents two years later anticipated similar operations elsewhere.

In the initial deployment, collection systems are recording “every single” conversation nationwide, storing billions of them in a 30-day…

Voir l’article original 1 468 mots de plus

Microsoft Exchange Server 2013 Part C

Epsilon Weblog

This is the 3rd installment in my blog post series on Microsoft Exchange Server 2013 based on the video training course by Infinite Skills of the same name. Your edge transport role server is in what we call the demilitarized zone with a firewall in front and behind and is on the perimeter of your network. The edge transport role server was not originally a part of Exchange 2013 and it was necessary to run Exchange 2010 with service pack 3 to do this job. Of course this changed with Exchange 2013 with service pack 1. If you run the online version of Exchange which is part of the Office 365 suite it works out at only around £4 per client and might be a good choice for small companies. An object is anything in the real world that needs representing within the program and Exchange 2013 has support for…

Voir l’article original 150 mots de plus

Microsoft Exchange Server 2013 Part D

Epsilon Weblog

This is the 4th installment in my blog post series on Microsoft Exchange Server 2013 based on what I have learnt doing the video training course of the same name by Infinite Skills. The journaling element of Exchange Server is the copying and backing up of emails. Even if an email is deleted a copy stills exists in back up and this is important for a business in this day and age for legal purposes. Database journaling works with the same interface and there are several other types of journaling.  To configure & create in journaling we use what are called rules. A rule scope is retained by the agent.The person who sends the email. It contains stuff like the smtp address and is put and the name of the recipient’s mailbox. You at the very least when journaling need to set up a mailbox for reports to be sent…

Voir l’article original 177 mots de plus

Intel NUC DC3217IYE and OS X 10.9

aiWeb 2.0

As many of you know by now, contrary to my recent article ‘Heading Over to the Dark Side‘ about moving away from Apples iPhone operating system and experiencing Android in any great anger, I am still a big fan of Apple’s products, including their very expensive Mac Pro starting at an eye-watering at $A3,999.00 and heading on up to their heart stopping $A5,299.00 for their 6-core system.

As much as I would like one of those, even their base Mac Mini at a little more reasonable $A749.00 is a little too expensive for me at the moment.

If you are familiar with this blog you will have read my tutorial ‘A Mac Pro at Quarter of the Price‘ where I go through selecting the correct hardware (similar to what Apple uses in their systems) to build yourself a powerful Mac Pro for a quarter of the…

Voir l’article original 1 552 mots de plus