Monthly Archives: May 2011

What is fseventsd?

fseventsd Apple has many processes that run when using OS X. fseventsd is one of these. What does it do? Well, this is the “File system events daemon” – it is a system process that is responsible for handling changes to the file system. You can find fseventsd in the activity monitor and also via by typing ps aux: What does fseventsd do? fseventsd writes file system event log files, and basically is used to monitor file system changes. A lot of programs (like CodeKit) can tie in / connect with fseventsd so that they can do things like recompile files automatically when they change. Dropbox uses fseventsd in order to monitor files that change so it can upload them. What’s the kernel to do when 10,000 file system changes occur in two seconds (say, as part of some software installation) and the stupid, lazy userspace process that registered for file system notifications is now too preoccupied with other things and hasn’t pulled any notification events off its queue in the past three seconds? – arstechnica There is a directory in the root called /.fseventsd which acts as a staging or buffer area. You will also notice a process called fseventsd if you open the activity monitor as mentioned above. Is fseventsd bad? If you are thinking about killing the fseventsd process or deleting the fseventsd folders, I would advise against it. These are required files and processes – and doing so may harm your system or crash your … Continue reading

Posted in Mac | Tagged , | 1 Comment

Fix “” Website Hack

If you are seeing this code, your website has been hacked: ~ Call 911 y0u g0t Hacked by Pak Cyber Army ~ <=Shak=> ~ If your website has been hacked and the spam is showing up, this is how you can fix it: This exploit usually only affects the root index file, perhaps that is index.html or index.php. Restore this file to a saved, earlier version, or rename it to something like index.txt or index.bak if you need to start from scratch. You may also want to look at the file-modification time to see when the file was last modified to get some idea of when the attack occurred. You should check the server logs and look for suspicious FTP activity, or unusually HTTP requests, especially ones with GET parameters or POST data. You should also check your .htaccess file for rewrite rules which will be redirecting visitors. If you have shell access run this command to see all files changes within the last 24 hours: find ~ -mtime -24 You can change ~ to ~/www or the path to your web root as needed.

Posted in Tech Tips, Web Development | Tagged , | Leave a comment

Complete List of Constant Contact E-mail Templates

Here is a complete list of Constant Contact E-mail Templates (names and preview images) as of May 4th, 2011. Asian Elegant Elegant II Playful Playful II Playful III Playful IV Sophisticated Sophisticated II

Posted in Design | 1 Comment

Swype Beta Download

If your phone doesn’t have Swype you can proceed with the installation by downloading Swype below. If you have Swype preinstalled, you may want to check out this post about removing the factory installed version of Swype, otherwise the installer package probably won’t work. If you need to grab the beta version of Swype, check out this link Swype Beta Download and you won’t have to go through the registration process.

Posted in Tech Tips | Leave a comment

Playstation Accounts Compromised – April 2011

Valued PlayStation Network/Qriocity Customer: We have discovered that between April 17 and April 19, 2011, certain PlayStation Network and Qriocity service user account information was compromised in connection with an illegal and unauthorized intrusion into our network. In response to this intrusion, we have: 1) Temporarily turned off PlayStation Network and Qriocity services; 2) Engaged an outside, recognized security firm to conduct a full and complete investigation into what happened; and 3) Quickly taken steps to enhance security and strengthen our network infrastructure by re-building our system to provide you with greater protection of your personal information. We greatly appreciate your patience, understanding and goodwill as we do whatever it takes to resolve these issues as quickly and efficiently as practicable. Although we are still investigating the details of this incident, we believe that an unauthorized person has obtained the following information that you provided: name, address (city, state/province, zip or postal code), country, email address, birthdate, PlayStation Network/Qriocity password and login, and handle/PSN online ID. It is also possible that your profile data, including purchase history and billing address (city, state, zip), and your PlayStation Network/Qriocity password security answers may have been obtained. If you have authorized a sub-account for your dependent, the same data with respect to your dependent may have been obtained. While there is no evidence that credit card data was taken at this time, we cannot rule out the possibility. If you have provided your credit card data through PlayStation Network or Qriocity, to be … Continue reading

Posted in Tech Opinion | Tagged | Leave a comment