10 More Discussions You Might Find Interesting
1. Linux
Hi All,
could any one point out any open source test-suites for "File cache" testing and as well as performance test suites for the same. Currently my system is up with Linux/ext4.
Regards
Manish (0 Replies)
Discussion started by: hmanish
0 Replies
2. Red Hat
Hi,
I had installed vsftp in rhel5 and i want to restrict all the local users from accessing the ftp.
i want to allow specific users to access the ftp server.
Request you to please help.
Thanks & regards
Arun (1 Reply)
Discussion started by: Arun.Kakarla
1 Replies
3. Linux
Hi all
I saw in Microsoft web site www.SysInternals.com a tool called CoreInfo from able to print out on screen the size of the Data and Instruction caches of your processor, the Locigal to Physical Processor mapping, the number of the CPU sockets. etc..
Do you know if in Linux is available a... (2 Replies)
Discussion started by: manustone
2 Replies
4. Shell Programming and Scripting
Hi ,
How to check whether web server is running from remote machine
How to check whether web server is running on web server itself
Can any one help me soon (1 Reply)
Discussion started by: satheeshkr_cse
1 Replies
5. OS X (Apple)
If I look at the permissions of a folder on a network share while using a local admin account on my computer, then authenticating as a open directory user to connect to the share, they appear completely different than if I had logged in as an OD user and looked at it, it also appears different from... (0 Replies)
Discussion started by: glev2005
0 Replies
6. UNIX for Advanced & Expert Users
Hi There,
i need to creat USERS in UNIX with restricted access to different directories.
for example
user1 should have access to dir1 and dir2
user2 should have access to dir2 and dir3
Please help me (4 Replies)
Discussion started by: ramanan25
4 Replies
7. IP Networking
Hello all
this is general question , if i have web server installed in my local pc and i have client that connecting to that web server
can i force it always to go via the internet network ?
the reason im asking is .. that im noticed when i close my internet connection i still can connect to my... (2 Replies)
Discussion started by: umen
2 Replies
8. UNIX for Dummies Questions & Answers
I'm in the process of setting up two new HP-UX 11.23 i64 servers.
On my existing server (HP-UX B.11.0) we have several users defined to have restricted sam access.
I'm having trouble finding those definitions and copying them over to the new servers. Is this possible - to just copy over the... (1 Reply)
Discussion started by: LisaS
1 Replies
9. Linux
Hi,
I want to create a user and allow its to be able to have telnet session like what you have in the ftp allow and deny. Is this possible
Thanx. (3 Replies)
Discussion started by: kayode
3 Replies
10. UNIX for Advanced & Expert Users
hi,
What is the difference between UBC cache and Metadata cache ? where can i find UBC cache Hits and Metadata cache Hits in hp-ux?
Advanced thanx for the help. (2 Replies)
Discussion started by: sushaga
2 Replies
CREEPY(1) General Commands Manual CREEPY(1)
NAME
CREEPY - A geolocation information aggregator
DESCRIPTION
creepy is an application that allows you to gather geolocation related information about users from social networking platforms and image
hosting services. The information is presented in a map inside the application where all the retrieved data is shown accompanied with rele-
vant information (i.e. what was posted from that specific location) to provide context to the presentation.
FEATURES
Map providers available :
Google Maps - Virtual Maps - Open Street Maps
Location information retieval from :
Twitter's tweet location:
Coordinates when tweet was posted from mobile device.
Place (geographical name) derived from users ip when posting on twitter's web interface. Place gets translated into coordinates
using geonames.com"
Bounding Box derived from users ip when posting on twitter's web interface.The less accurate source , a corner of the bounding box
is selected randomly.
Geolocation information accessible through image hosting services API
EXIF tags from the photos posted.
Social networking platforms currently supported:
Twitter
Foursquare (only checkins that are posted to twitter).
Image hosting services currently supported :
flickr - information retrieved from API
twitpic.com - information retrieved from API and photo exif tags
yfrog.com - information retrieved from photo exif tags
img.ly - information retrieved from photo exif tags
plixi.com - information retrieved from photo exif tags
twitrpix.com - information retrieved from photo exif tags
foleext.com - information retrieved from photo exif tags
shozu.com - information retrieved from photo exif tags
pickhur.com - information retrieved from photo exif tags
moby.to - information retrieved from API and photo exif tags
twitsnaps.com - information retrieved from photo exif tags
twitgoo.com - information retrieved from photo exif tags
NOTES
Automatic caching of retrieved information in order to reduce API calls and the possibility of hitting limit rates.
GUI with navigable map for better overview of the accumulated information
4 Maps providers (including Google Maps) to use.
Open locations in Google Maps in your browser
Export retrieved locations list as kmz (for Google Earth) or csv files.
Handling twitter authentication in an easy way using oAuth. User credentials are not shared with the application.
User/target search for twitter and flickr.
AUTHOR
creepy was written by Yiannis Kakavas <jkakavas@gmail.com>
This manual page was written by Daniel Echeverry for the Debian GNU/Linux system (but may be used by others).
SEE ALSO
The full documentation which includes the keys descriptions is in /usr/share/doc/creepy/README.
MAY 08, 2011 CREEPY(1)