Filed under: tips

Custom Domains, Dreamhost, and Posterous

I sent this to a buddy of mine so he could set up his domain to point towards his Posterous blog, and I thought maybe someone else might benefit from it as well.

If your domain is registered through Dreamhost, this is how you set an A record towards your Posterous blog.

Go to the "Manage Domains" section of http://panel.dreamhost.com
Add the A record as shown. I used a subdomain, but you could use your primary domain name, as well.

For the subdomain, I entered "blog" in the "Name" field.
"Type" dropdown list should show "A".
"Value" should be: 184.106.20.102 
Click "Add Record Now!"

A_records_on_dreamhost

Once Dreamhost is setup, you can modify the settings for your Posterous blog to use that domain (or subdomain.)
Go to the settings for the blog you're setting up. With the new Posterous "Spaces" layout, you'd click on "Spaces" in the top menu, then click the gear icon next to the blog you want to change, then "Space Settings".

Click the "Edit" button.
Manage_my_account_-_posterous_
Mine is already linked, but you'll see where to enter the domain (or subdomain.)
0manage_my_account_-_posterous_
Once it's entered, click "Save Settings" and wait for DNS to propagate.

More information can be found on the Posterous help pages: http://help.posterous.com/setting-up-a-domain-with-a-third-party-regist

Watch Out! This Trojan Pretends To Be Adobe Flash To Infect Your Mac

 
Watch Out! This Trojan Pretends To Be Adobe Flash To Infect Your Mac
Published on Cult of Mac | shared via feedly mobile

There’s loads of reasons not to install Flash on your Mac, from extending your battery life to keeping your system running like greased lightning. If those reasons aren’t good enough for you, though, here’s another one: a new Trojan for Mac is going around that poses as FlashPlayer, and if you’re not careful, installing Flash on a new Mac is all that it could take to infect your system.

F-Secure calls the Trojan Bash/QHost.WB. Here’s how it works:

Once installed, the trojan adds entries to the hosts file to hijack users visiting various Google sites (e.g., Google.com.tw, Google.com.tl, et cetera) to the IP address 91.224.160.26, which is located in Netherlands.

The server at the IP address displays a fake webpage designed to appear similar to the legitimate Google site.

Here’s what it looks like in action:

Worse, the Trojan actually is programmed to serve pop-up ads, and while no ads are displaying now, the system’s in place, just waiting to go live.

Obviously, if you’re going to install Flash, the only safe way to do so is through Adobe’s official site. Why not try to live without it though? Your computer will thank you. Similar Posts: