Category Archives: Uncategorized

pip install results in undefined symbol: XML_SetHashSalt

# python3 -m pip install --upgrade google-api-python-client
Traceback (most recent call last):
File "/usr/lib64/python3.4/runpy.py", line 170, in _run_module_as_main
"__main__", mod_spec)
File "/usr/lib64/python3.4/runpy.py", line 85, in _run_code
exec(code, run_globals)
File "/usr/lib/python3.4/site-packages/pip/__main__.py", line 16, in
from pip._internal import main as _main # noqa
File "/usr/lib/python3.4/site-packages/pip/_internal/__init__.py", line 42, in
from pip._internal import cmdoptions
File "/usr/lib/python3.4/site-packages/pip/_internal/cmdoptions.py", line 16, in
from pip._internal.index import (
File "/usr/lib/python3.4/site-packages/pip/_internal/index.py", line 16, in
from pip._vendor.distlib.compat import unescape
File "/usr/lib/python3.4/site-packages/pip/_vendor/distlib/compat.py", line 83, in
import xmlrpc.client as xmlrpclib
File "/usr/lib64/python3.4/xmlrpc/client.py", line 137, in
from xml.parsers import expat
File "/usr/lib64/python3.4/xml/parsers/expat.py", line 4, in
from pyexpat import *
ImportError: /usr/lib64/python3.4/lib-dynload/pyexpat.cpython-34m.so: undefined symbol: XML_SetHashSalt
# ldd /usr/lib64/python3.4/lib-dynload/pyexpat.cpython-34m.so
linux-vdso.so.1 => (0x00007fffaefc4000)
libexpat.so.1 => /ora12cClient/oracle/app/oracle/product/12.1.0.2/client/lib/libexpat.so.1 (0x00007f1939572000)
libpython3.4m.so.1.0 => /lib64/libpython3.4m.so.1.0 (0x00007f19390de000)
libpthread.so.0 => /lib64/libpthread.so.0 (0x00007f1938ec2000)
libc.so.6 => /lib64/libc.so.6 (0x00007f1938aff000)
libdl.so.2 => /lib64/libdl.so.2 (0x00007f19388fa000)
libutil.so.1 => /lib64/libutil.so.1 (0x00007f19386f7000)
libm.so.6 => /lib64/libm.so.6 (0x00007f19383f5000)
/lib64/ld-linux-x86-64.so.2 (0x0000559b24b1f000)
# echo $LD_LIBRARY_PATH
# export LD_LIBRARY_PATH=/usr/lib64
# ldd /usr/lib64/python3.4/lib-dynload/pyexpat.cpython-34m.so
linux-vdso.so.1 => (0x00007ffef39b1000)
libexpat.so.1 => /usr/lib64/libexpat.so.1 (0x00007f20c7b7b000)
libpython3.4m.so.1.0 => /usr/lib64/libpython3.4m.so.1.0 (0x00007f20c76e7000)
libpthread.so.0 => /usr/lib64/libpthread.so.0 (0x00007f20c74cb000)
libc.so.6 => /usr/lib64/libc.so.6 (0x00007f20c7108000)
libdl.so.2 => /usr/lib64/libdl.so.2 (0x00007f20c6f04000)
libutil.so.1 => /usr/lib64/libutil.so.1 (0x00007f20c6d00000)
libm.so.6 => /usr/lib64/libm.so.6 (0x00007f20c69fe000)
/lib64/ld-linux-x86-64.so.2 (0x000055a1cf2f4000)
# python3 -m pip install --upgrade google-api-python-client
Collecting google-api-python-client
...

Network security

Cybersecurity is the state or process of protecting and recovering computer systems, networks, devices, and programs from damage or compromise by hostile computer software and hardware.

What is Network Security and Why is it Important?

The aim is to protect an organization from the harm done by such programs or devices by restricting access and preventing malicious use.

For a computer to be considered secure, it must have security features that control access to computer files, data, programs, and services; prevent unauthorized access to the system; detect malicious, fraudulent, or unintended use of the system; and ensure that unauthorized changes are not made to the system.

Network Security and the Internet

Network security refers to the security of the networks that connect computers together to share information and data, and the security of the connections that systems use to communicate with each other.

Network security systems implement mechanisms that protect systems, networks, and devices from unauthorized access to computer data or network resources. In addition, network security systems establish and maintain security policies that protect users’ ability to use network resources. Visit https://www.fortinet.com/solutions/enterprise-midsize-business/network-access to get all the necessary details about network security.

Host-based Security and IP Security

Host-based security is an online security system in which an administrator uses a centralized security system to set up user accounts, set restrictions on access, establish policies, and deploy an operating system and software for the users of the system.

IP security is the security of computer systems and networks through the use of a physical or virtual private network (VPN). This ensures that data remains secure and is not interrupted if it is sent through the network, even if it travels over public computers. This ensures that traffic is protected from intrusion or disclosure when it traverses the Internet.

Anti-Virus, Spyware, and Malware

Antivirus software scans your computer for viruses. Spyware software scours your computer for unwanted applications that are used to monitor or spy on you. Malware, or potentially unwanted programs, is unwanted programs that are used to attack your computer and steal your personal information.

When faced with an attack, anti-virus software usually tries to prevent the infection before it gets to the main operating system. Spyware and malware programs look for and steal information by hijacking the information you receive through e-mail, file transfer, or other forms of communication.

Zimbra Attachment Parsing Bugs

After a morning of troubleshooting poor performance on an archive store that was causing backups on the mtas I would bet we’ve hit a regression. Zimbra doesn’t recognize it.

One of the admins IM’ed me a little after 9am yesterday complaining of queue backups on the mtas delivering to the archive store. They have 5 user stores and 1 archive store.

Connecting to port 7025 (lmtp) on the archive store shows sporadic hangs. Some mail was getting in but thousands were backed up on the mtas.

A quick look at the mailbox.log showed errors connecting to the conversion daemon:

2009-03-05 10:25:54,909 WARN  [LmtpServer-20] [name=user-20080704@domain.tld.archive;
mid=70;] ParsedMessage - Unable to parse part 2 (file.pdf, application/pdf) of 
message with Message-ID <000f01c29c4e$3434d3c0$315c200a@user.domain.tld>.
com.zimbra.cs.mime.MimeHandlerException: cannot extract text
    at com.zimbra.cs.mime.handler.DefaultHandler.getContentImpl(
DefaultHandler.java:117)    
    at com.zimbra.cs.mime.MimeHandler.getContent(MimeHandler.java:148)
    at com.zimbra.cs.mime.ParsedMessage.analyzePart(ParsedMessage.java:1148)    
    at com.zimbra.cs.mime.ParsedMessage.analyzeNonBodyParts(ParsedMessage.java:426) 
...
Caused by: com.zimbra.cs.convert.ConversionException: Cannot extract text from 
document that previously crashed convertd.
    at com.zimbra.cs.convert.TransformationClient.extract(
TransformationClient.java:196)
    at com.zimbra.cs.convert.SocketTransformationStub.doExtract(
SocketTransformationStub.java:84)
    at com.zimbra.cs.convert.SocketTransformationStub.extract(
SocketTransformationStub.java:116)
    at com.zimbra.cs.mime.handler.DefaultHandler.getContentImpl(
DefaultHandler.java:111)
    ... 27 more

So on first look convertd died, I restarted it:
su - zimbra -c "zmconvertctl start"

convertd started and the errors in mailbox.log went away. But kvoop processes started to consume cpu. The load rose to almost 30.

This is the kvoop bug we fixed by turning of attachment indexing.. So I checked that and archiving is on again on the archive cos(!)


zimbra@host log]$ zmprov gc default |grep -i attachment
zimbraAttachmentsBlocked: FALSE
zimbraAttachmentsIndexingEnabled: FALSE
zimbraAttachmentsViewInHtmlOnly: FALSE
[zimbra@host log]$ zmprov gc archive |grep -i attachment
zimbraAttachmentsBlocked: FALSE
zimbraAttachmentsIndexingEnabled: TRUE
zimbraAttachmentsViewInHtmlOnly: FALSE
[zimbra@host log]$ 

zimbra@host log]$ zmprov modifyCos archive zimbraAttachmentsIndexingEnabled 
FALSE
zimbra@host log]$

I flushed the queues and all is well.

Background:

http://wiki.zimbra.com/index.php?title=Disable_Indexing_for_Specific_File_Types


http://bugzilla.zimbra.com/show_bug.cgi?id=14016

Look at the bottom of the bugzilla link: It looks to me like we’re hitting a regression: a bug they thought they fixed in 4.5.x is resurfacing in 5.0.x:


------- Comment  #10 From tech 2008-10-06 03:44:08  -------

this bug seems to have started happening intermittently on my 5.04 rhel_x86
installation it hangs the server so i have to reboot

Oklahoma

Every time I travel to Oklahoma I am asked “are you going out to the midwest?” I generally correct the speaker but could never really put my finger on how to categorize it. It’s not the midwest: the accents have a twang that hints at southern. It’s not the South: no sweet tea. It’s not the West: they’re not earthy enough.

I was writing an old friend this week when it dawned on me: Oklahoma is prairie meets southern hospitality with no sweet tea and less soul food.

If you have been to the South proper (Mississippi, Tennessee, rural Georgia) you know they both love their sweet tea and distrust those that don’t drink it.. or worse those that suggest (as I do) that it’s as simple as simply adding sugar to warm tea.. which it is but I digress. This doesn’t happen in Oklahoma. They do however serve unsweet tea absolutely everywhere in Oklahoma.

You won’t get comfort food in Oklahoma but you do get an excess of beef. Oklahoma City is the home of the “World’s Largest Stockyards.” And they do love their beef. We’re talking about restaurants that serve chicken so there’s an option for vegetarians.

Oklahoma also has some intense open spaces. For instalnce turnpike exits where the closest towns are 25 miles in either direction and the next exit is 30+ miles. This is fine until you find yourself there at 7:30 in the morning on a motorcycle and realize your fuel light is on. The woman at the toll booth was at least very nice.

Search Engine Optimization for Shopping sites

Search engine marketing allows you to target users that live in a certain location near your business. SEO is a must for landing a visitor, and being able to get information on where your audience lives will help you decide how best to reach them.

In this article, you’ll learn how to create an effective Google Shopping landing page that targets the right people.

How to target a Google Shopping site?

Having an interesting and relevant product on your shopping page helps people make decisions about how to complete your online purchase.

If you don’t have an effective Google Shopping landing page, you’re missing out on a substantial amount of customers, and you can find even more clients using SEO, since you can find SEO reseller that can help with getting the right services for this. It’s even more critical for businesses with a physical location and multiple locations around the country.

Step 1: Finding your location

Google shows the closest shopping page for each US state. To determine the closest Google Shopping landing page, visit the address that corresponds to your business, and then the closest city in that state. For example, if you were in New York City, Google would show you the closest city’s page, and then suggest an appropriate Google Shopping landing page for New York.

For example, if you were in New York City, Google would show you the closest city’s page, and then suggest an appropriate Google Shopping landing page for New York. Click through to the state you’re located in.

Step 2: Find your best product

Let’s start with your products. The first step is to find the best product that fits your niche. You should always select products with a compelling value proposition and strong competition, as well as items that aren’t already available on Google. You can find a list of our best rated products here. If you haven’t registered a product yet, please complete the sign-up form.

Step 3: Write a content for your product

When deciding what to write about for your product, be sure to choose content that will clearly demonstrate what you offer. Google is very picky when it comes to product description.

At the beginning of your product’s description, state the primary purpose of the product, who it’s designed for, and why they should buy.

state the primary purpose of the product, who it’s designed for, and why they should buy. Include a link to the company website if it isn’t available.

if it isn’t available. Include some information about the product’s current price, including the amount you’re offering.

Don’t use words like “discount” or “special” in your descriptions.

in your descriptions. Avoid using personal information (e.g., a name, email address, phone number, Facebook page URL, etc.) or including links to products or services that you don’t operate (e.g., the website for the third party selling the product or the company website).

What’s your best value proposition?

Don’t assume your product isn’t unique by being unique to your niche. You might not be the first one to make a product similar to yours, so stay ahead of the pack and be bold by writing what your target market wants and needs.

For example, assume your niche is technology, and your product is a tool for setting alarms and timers. It’s important to present the features you bring to the table so they’ll understand why you think your product will be a great fit for their product.

In our example, we tried to make it clear why we thought the product would be appealing.

Many seniors and their adult children expect that when they move into a retirement community, they’re immediately entering what they believe to be a stereotypical nursing home atmosphere. They want to experience what it’s like to be at the core of that environment. Unfortunately, as it turns out, many nursing home residents have no idea where to begin.
This article will present the basics on the topic of nursing home etiquette. You can also check out sites like www.palmvistaseniorliving.com/living-options/memory-care/ to get an idea.

The Basics

The purpose of senior living facilities and home health care services like Heritage Woods Senior Living is to provide comfortable, supportive, and cost-effective care for seniors. The residents of the nursing home should be treated with compassion, courtesy, and respect. The residents should be able to speak their minds without fear of ridicule, reprisal, or reprisal from staff members. Nursing homes and nursing homes staff have an obligation to provide an environment that fosters independence and personal responsibility, so residents should be able to take care of themselves. Staff members are expected to demonstrate personal dignity and a respect for the residents. A nursing home or senior living home like Villa de San Antonio Senior Living may require residents to provide written instructions to residents’ caregivers. Nursing home staff must recognize that the residents may not understand the intent of the instructions and must not provide written instructions that the residents do not understand or do not have a reasonable opportunity to understand. If you need more guidance, you can visit sites like lifeatcypresscourt.com. If you are interested in making healthcare your career visit UC Merced, Public Health Education for guidance. 

If You Plan On Aging in Place, You Need to Read These Expert Tips

In some circumstances, it may be appropriate for the nursing home to require residents to take medication. According to facilities like the independent living in Warren, NJ, the patient’s medical condition and preferences should be discussed before the medication is administered. The medications and instructions are intended to be used by the patient only. If the resident asks the staff member to stop the medication or to take it out of the medication cup, the staff member must comply. You can visit Summerfield of Fresno and learn more about assisted living.

When possible, the medication must be taken by the resident. If there is no choice, the resident should be offered the choice of taking the medication in a glass, capsule or similar container rather than placing it in the medication cup. To get an idea how high quality assisted living serve residents, check out sites like https://www.crescendoseniorliving.com/services/.

 

Physician-Assisted Therapy (PAT)

When a resident has been assessed to be capable of participating in clinical activities, a physician may determine that the resident is appropriate to participate in a resident-physician PCT. (See Section 9.16) When a resident is not expected to participate in a clinical activity during a PCT, the physician should inform the resident of the anticipated need for and the limitations of the PCT. The physician-assisted PCT may be limited to a single patient or to the entire clinical period of the PCT. In either event, the physician-assisted PCT shall be conducted by the resident under the supervision of the physician, and shall involve the resident’s diagnosis, diagnosis and treatment of the individual condition for which the individual is being treated.

A physician-assisted PCT may be performed by a physician in the department of health care finance and policy and all that using the appropriate software (see this to learn more). The physician-assisted PCT must be performed on an outpatient basis. A physician who is certified by the state board of osteopathic medicine shall be considered a resident physician for the purposes of conducting a physician-assisted PCT. If you’re interested in healthcare jobs, visit sites like https://www.utmb.edu/hr/home.