<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Linux &#8211; BTA Blog</title>
	<atom:link href="https://www.businesstechnologyassociates.com/blog/category/technology/linux/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.businesstechnologyassociates.com/blog</link>
	<description>Weblog about business and technology issues</description>
	<lastBuildDate>Wed, 17 Aug 2022 23:21:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>MySQL/MariaDB needs upgrading after upgrading</title>
		<link>https://www.businesstechnologyassociates.com/blog/2021/10/mysql-mariadb-needs-upgrading-after-upgrading/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Sat, 02 Oct 2021 22:06:12 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[MySQL]]></category>
		<guid isPermaLink="false">https://www.businesstechnologyassociates.com/blog/?p=342</guid>

					<description><![CDATA[Recently I was reviewing log files for one of my servers and came across the following error message: mysqldump: Couldn't execute 'SHOW FUNCTION STATUS WHERE Db = 'mysql'': Cannot load from mysql.proc. The table is probably corrupted (1728) mysqldump: Couldn't execute 'SHOW FUNCTION STATUS WHERE Db = 'mydatabase'': Cannot load from mysql.proc. The table is &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2021/10/mysql-mariadb-needs-upgrading-after-upgrading/" class="more-link">Continue reading<span class="screen-reader-text"> "MySQL/MariaDB needs upgrading after upgrading"</span></a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>New Year Resolutions</title>
		<link>https://www.businesstechnologyassociates.com/blog/2015/01/new-year-resolutions/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Sat, 03 Jan 2015 23:26:26 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Macintosh]]></category>
		<category><![CDATA[MS Windows]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">http://www.businesstechnologyassociates.com/blog/?p=217</guid>

					<description><![CDATA[I usually do not make New Year&#8217;s resolutions because I mostly forget them by the Super Bowl. But this year I am getting my online life more secure. I will change all my passwords to 20+ random characters. I will store these passwords in a secure format. I will encrypt more email. The first 2 &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2015/01/new-year-resolutions/" class="more-link">Continue reading<span class="screen-reader-text"> "New Year Resolutions"</span></a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Antivirus is Dead!</title>
		<link>https://www.businesstechnologyassociates.com/blog/2014/05/antivirus-is-dead/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Mon, 05 May 2014 15:09:43 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[MS Windows]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">http://www.businesstechnologyassociates.com/blog/?p=205</guid>

					<description><![CDATA[So declared Brian Dye, Symantec&#8217;s senior vice president for information security. &#8220;We don&#8217;t think of antivirus as a moneymaker in any way.&#8221;  Mr. Dye went on to say &#8220;antivirus now catches just 45% of cyberattacks.&#8221; So because they cannot make money, this segment of the software industry is dead?  Maybe they are not any good &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2014/05/antivirus-is-dead/" class="more-link">Continue reading<span class="screen-reader-text"> "Antivirus is Dead!"</span></a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Heartbleed Bug &#8211; End of the World or Non-event?</title>
		<link>https://www.businesstechnologyassociates.com/blog/2014/04/heartbleed-bug-end-of-the-world-or-non-event/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Sat, 12 Apr 2014 14:05:57 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Macintosh]]></category>
		<category><![CDATA[MS Windows]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[bug]]></category>
		<category><![CDATA[OpenSSL]]></category>
		<category><![CDATA[SSL]]></category>
		<guid isPermaLink="false">http://www.businesstechnologyassociates.com/blog/?p=187</guid>

					<description><![CDATA[That about covers the risks.  Now what can you do about it?  First, update your computer (Windows, Mac OS X or Linux/Unix), right now!  Before you read the rest of this post. Most software vendors/service providers recognized the serious nature of this bug and updated their software (the easy part).  So getting the fix is &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2014/04/heartbleed-bug-end-of-the-world-or-non-event/" class="more-link">Continue reading<span class="screen-reader-text"> "Heartbleed Bug &#8211; End of the World or Non-event?"</span></a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Microsoft dropping XP support</title>
		<link>https://www.businesstechnologyassociates.com/blog/2014/04/microsoft-dropping-xp-support/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Mon, 07 Apr 2014 19:03:54 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Macintosh]]></category>
		<category><![CDATA[MS Windows]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">http://www.businesstechnologyassociates.com/blog/?p=179</guid>

					<description><![CDATA[Microsoft has finally made good on their threat to stop supporting Windows XP and on April 8, 2014 will stop providing update and fixes for one of their most popular operating system releases.  Microsoft released Windows XP in 2001 and end development of it in 2008.  They have continued to provide bug-fixes and minor updates &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2014/04/microsoft-dropping-xp-support/" class="more-link">Continue reading<span class="screen-reader-text"> "Microsoft dropping XP support"</span></a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Simple Intrusion Detection</title>
		<link>https://www.businesstechnologyassociates.com/blog/2011/12/simple-intrusion-detection/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Thu, 15 Dec 2011 06:22:59 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Macintosh]]></category>
		<category><![CDATA[MS Windows]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[cfv]]></category>
		<category><![CDATA[gpg]]></category>
		<category><![CDATA[IDS]]></category>
		<guid isPermaLink="false">http://www.businesstechnologyassociates.com/blog/?p=113</guid>

					<description><![CDATA[Sometimes I want to have a simple way to determine if a file has been changed or has been compromised without the configuration required of a full feature IDS such as AIDE or Tripwire.  This technique uses CFV, a free and open-source program written in Python and &#8220;has been verified to work on linux, freebsd, &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2011/12/simple-intrusion-detection/" class="more-link">Continue reading<span class="screen-reader-text"> "Simple Intrusion Detection"</span></a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Amazon Simple Storage Service (S3)</title>
		<link>https://www.businesstechnologyassociates.com/blog/2011/07/amazon-simple-storage-service-s3/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Tue, 19 Jul 2011 17:23:08 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">http://www.businesstechnologyassociates.com/blog/?p=104</guid>

					<description><![CDATA[I have been using Amazon Simple Storage Service (S3) for several years to provide off-site backup and synchronizing files on my numerous systems.  It is a cloud-based service that provides storage for a very reasonable cost ($0.14 per GB/Month as of 7/19/2011).  Access to files on S3 are through web service interfaces (REST, SOAP, and BitTorrent) &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2011/07/amazon-simple-storage-service-s3/" class="more-link">Continue reading<span class="screen-reader-text"> "Amazon Simple Storage Service (S3)"</span></a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Keeping track of passwords</title>
		<link>https://www.businesstechnologyassociates.com/blog/2010/03/keeping-track-of-passwords/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Fri, 26 Mar 2010 20:53:31 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Macintosh]]></category>
		<category><![CDATA[MS Windows]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Passwords]]></category>
		<guid isPermaLink="false">http://www.businesstechnologyassociates.com/blog/?p=18</guid>

					<description><![CDATA[If you have run out of pets&#8217; or children&#8217;s names to use for passwords.  Or you have ever misplaced that scrap of paper with your bank PINs and passwords.  Or if you have trouble remembering the contrived &#8220;passwords&#8221; that banks are now asking like &#8220;What was your first girl friend&#8217;s name?&#8221;, then maybe you are &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2010/03/keeping-track-of-passwords/" class="more-link">Continue reading<span class="screen-reader-text"> "Keeping track of passwords"</span></a></p>]]></description>
		
		
		
			</item>
	</channel>
</rss>
