CLICK HERE TO SHOP
Ready for the Weekend: Pointy Flats
CLICK HERE TO SHOP
Dear Fairy Model Mother: Should I Get Back In the Game?
After hearing my friend utter these words, I was floored. He explained that he'd been represented in all the major markets and done his fair share of traveling. But after being in the business for a bit, he started to grow weary. Modeling for him was a no-brainer. He could do it in his sleep. My boy longed for a challenge. He's a not just a pretty face, but a great musician and a legit actor. One day while on contract in Miami, he had an epiphany. It was literally that "What the f*** am I doing with my life" moment. So he pulled the plug on his modeling career.
I totally get it. When you need a change, you have to do it. But here's my thing, if you've got the look then you should always have someone out there making deals on your behalf. Even if modeling isn't something you want to do full time anymore, having an agent doesn't hurt your situation... it makes things better. I really feel like as a model who knows how the game is played, the longer you stay in it the more control you have over your career. You can tell your agent you only want direct bookings or specify the clients you want to work with. And that's exactly what I told my friend. To be more specific, I told him that any agent would be crazy not to represent him. The ball is in his court. He's totally bankable.
Don't waste your talents, darlings. Cash in. As always... if you need any advice, your Fairy Model Mother is here. Just drop me a line, and I've got you!
Killing It!
This woman looks phenomenal. When she stepped onto the red carpet, all eyes were on her and all mouths instantly dropped. Charlize is an angelic vision. Simple makeup. Short, golden hair. And that white Dior Couture gown. Charlize is knocking 'em dead. Now that's how you work the Oscars. Everyone else, please take notes.
Chime in: who was your best and worst dressed at this year's Academy Awards?
Beauty Blast: Rose-Colored Lips
Photography by Jenn Hoffman, Makeup by Leslie Rodriguez |
What you'll need: MAC's lipstick in Rebel and lip liner in Burgundy
"If you're a little hesitant to dive into such a bold color, there are a few steps to ease into it. Your first day, you can use it as a stain by applying with your finger lightly to your lips and a little bit of lip balm. On your second day you can use the lipstick directly on your lips. Once you get acquainted with having a darker color on, add a liner to get the complete look. On Nikia we filled in the lips with the liner and applied the lip color with a lip brush.
This rosy lip is so easy and looks fantastic on any woman. Getting this look should take less than five minutes, but will last all day. For extra glam appleal make sure you line your line your upper lip to accentuate your Cupid's bow. It's one of the sexiest parts of your face. You'll be breaking hearts left and right.
Pucker up: Are there any bold colors you want to wear, but are nervous to try?
HOWTO : Highest secured Hiawatha Web Server 8.8 on Ubuntu 12.04 LTS Server
Hiawatha is a very secure and fast web server in the market. It supports PHP, Perl, Python and Ruby. It is also very lightweight, easy to configure and setup too. How secure? Please refer to the features of Hiawatha.
For the performance, please refer to the study of SaltwaterC at here.
This tutorial is writing for setting up the highest secured web server. Please also to apply the "Optional" steps mentioned below for making the highest secured web server.
Prerequisite
Select
Update the fresh install system to the latest status.
Select unattendance update to your system. It will push all the updates to your system when there is some. Or, you can create a cron job later to update your system in a certain of time if you prefer.
If the kernel or kernel modules have been updated, you are required to reboot your system before going further.
Step 1 - Installation of PHP5
Step 1a - Installation of Percona Server (MySQL Alternative)
To use Percona Server instead of MySQL is due to the performance.
Step 2 - Installation of Hiawatha
Install required dependenices for Hiawatha.
Download the latest version of CMake at http://www.cmake.org/
Download the latest version of Hiawatha (the current version at this writing is 8.8).
or
Step 3 - Configure PHP5
The following settings are for making PHP5 more secure.
Make changes as is.
Step 3a - Configure PHP5 (Optional for security purpose)
*** According to the author of Hiawatha, the cgi.fix_pathinfo should be set to 0 at this moment.
*** There will be something at the end of "disable_functions" at Ubuntu 12.04 LTS, you just append the captioned list to the end of the previous list.
*** some PHP applications may require
Step 4 - Configure php-fpm
Append the following to the php-fpm.conf.
Step 5 - Configure Hiawatha (Part 1)
Uncomment
Uncomment the following entries at
Step 5a (Optional for security purpose) :
Add the following line at the
Make changes for the following entries at
Step 5b :
The entries at
Step 5c :
Add the following line at
*Make sure the make a directory
Step 6 - Configure Hiawatha (Part 2)
If your domain is mysite.com, you are required to create a file namely
*** You can ignore the "
*** If you do not implement "Step 7" below, please do not add "WrapCGI = Jail_mysite".
*** "
Furthermore, if you want to disable this virtual site, you can move the "
Step 7 - Configure Hiawatha (Part 3) (Optional for security purpose)
Step 8 - Configure Apparmor (Optional for security purpose)
Install the following packages :
Execute the following command and then let the web site running for a while, maybe a week or so.
About one week later or the web page/site is misbehaving, issue the following command to update the profile. Remember to reload the profile after the command has been issued.
Or, if you are impatient, you can edit the following file instead.
The content of
Make the profile in enforce mode (activate the above settings).
If you have change some settings, you should reload the profile.
If you want to disable this profile.
If you want to re-enable this profile after it has been disabled.
Step 9 - Enhance the security of cgi-wrapper (Optional for security purpose)
Now, your hiawatha is very secure but I would like to make it more secure.
Apply Capabilities on cgi-wrapper.
The result of getcap :
It will display :
Step 10 - Configure logwatch (Optional)
Please refer to this link to make the LogWatch to know your Hiawatha webserver's log files.
Please make sure to re-do this step when the logwatch is updated or upgraded as it will overwrite the configure file.
Step 11 - Change the ownership of the log files
* "
Step 11a - Change ownership of all directories and files at the /var/www/mysite
Put the web application files to /var/www/mysite and then change the ownership of all directories and files under /var/www/mysite to root:root.
Step 12 - Start, Stop and Restart Hiawatha
Step 13 - Performance tuning for MySQL or Percona Server (Optional)
You can fine tune the MySQL as per this link.
Step 14 - Secure your Ubuntu Server in a passive way (Optional)
Please refer to this link to secure your server in a passive way.
Step 15 - Setup a FTP server on Ubuntu Server (Optional)
This link shows you how to setup a vsFTPd server.
Step 16 - URL Rewrite rules (Optional)
For the url rewrite rules for your PHP applications, please refer to this link
Make sure you add "UseToolkit" at the VirtualHost section.
Step 17 - Send email to GMail via Postfix (Optional)
Please refer to this link
Step 18 - Create normal user for MySQL or MariaDB as well as Percona Server (Optional)
Please refer to this link
Remarks :
If you encounter "
After several days browsing the website, you may consider to turn the Apparmor to "
It is because the captioned
In order to further hardened your Hiawatha web server, please consider the following options :
Optional #1 :
For SSH connection security, you also may consider to implement the Port Knocking feature.
Optional #2 :
You may also consider to enable your firewall at your router or on the Hiawatha Web Server with UFW.
If ufw does not exist in your server, you can install it :
Optional #3 :
Consider to install Suricata IPS on your server.
That's all! See you.
For the performance, please refer to the study of SaltwaterC at here.
This tutorial is writing for setting up the highest secured web server. Please also to apply the "Optional" steps mentioned below for making the highest secured web server.
Prerequisite
Select
OpenSSH
and Mail Server
when installing Ubuntu Server 12.04 LTS
.Update the fresh install system to the latest status.
sudo apt-get update
sudo apt-get upgrade
sudo apt-get dist-upgrade
Select unattendance update to your system. It will push all the updates to your system when there is some. Or, you can create a cron job later to update your system in a certain of time if you prefer.
If the kernel or kernel modules have been updated, you are required to reboot your system before going further.
Step 1 - Installation of PHP5
sudo apt-get install php5-cgi php5 php5-cli php5-mysql php5-curl php5-gd php5-intl php-pear php5-imagick php5-imap php5-mcrypt php5-memcache php5-ming php5-ps php5-pspell php5-recode php5-snmp php5-sqlite php5-tidy php5-xmlrpc php5-xsl php5-xcache php5-suhosin php5-ffmpeg apache2-utils php5-fpm
Step 1a - Installation of Percona Server (MySQL Alternative)
To use Percona Server instead of MySQL is due to the performance.
gpg --keyserver hkp://keys.gnupg.net --recv-keys 1C4CBDCDCD2EFD2A
gpg -a --export CD2EFD2A | sudo apt-key add -
sudo nano /etc/apt/source.list.d/percona.list
deb http://repo.percona.com/apt precise main
deb-src http://repo.percona.com/apt precise main
sudo apt-get update
sudo apt-get install percona-server-server-5.5 percona-server-client-5.5
Step 2 - Installation of Hiawatha
Install required dependenices for Hiawatha.
sudo apt-get install libc6-dev libssl-dev dpkg-dev debhelper fakeroot libxml2-dev libxslt1-dev
Download the latest version of CMake at http://www.cmake.org/
wget http://www.cmake.org/files/v2.8/cmake-2.8.10.2.tar.gz
tar -xvzf cmake-2.8.10.2.tar.gz
cd cmake-2.8.10.2
./configure
make
sudo make install
Download the latest version of Hiawatha (the current version at this writing is 8.8).
wget http://www.hiawatha-webserver.org/files/hiawatha-8.8.tar.gz
tar -xzvf hiawatha-8.8.tar.gz
cd hiawatha-8.8/extra
./make_debian_package
cd ..
sudo dpkg -i hiawatha_8.8_amd64.deb
or
sudo dpkg -i hiawatha_8.8_i386.deb
Step 3 - Configure PHP5
The following settings are for making PHP5 more secure.
sudo nano /etc/php5/cgi/php.ini
Make changes as is.
cgi.rfc2616_headers = 1
zlib.output_compression = On
zlib.output_compression_level = 6
Step 3a - Configure PHP5 (Optional for security purpose)
display_errors = Off
log_errors = On
allow_url_fopen = Off
safe_mode = On
expose_php = Off
enable_dl = Off
session.cookie_httponly = 1
disable_functions = system, show_source, symlink, exec, dl, shell_exec, passthru, phpinfo, escapeshellarg, escapeshellcmd
cgi.fix_pathinfo = 0
*** According to the author of Hiawatha, the cgi.fix_pathinfo should be set to 0 at this moment.
*** There will be something at the end of "disable_functions" at Ubuntu 12.04 LTS, you just append the captioned list to the end of the previous list.
*** some PHP applications may require
safe_mode = off
Step 4 - Configure php-fpm
Append the following to the php-fpm.conf.
sudo nano /etc/php5/fpm/php-fpm.conf
[www]
user = www-data
group = www-data
listen = 127.0.0.1:9000
pm = static
pm.max_children = 100
chroot = /var/www/
chdir = /
Step 5 - Configure Hiawatha (Part 1)
sudo nano /etc/hiawatha/hiawatha.conf
Uncomment
ServerId
at GENERAL SETTINGS
.ServerId = www-data
Uncomment the following entries at
BINDING SETTINGS
.Binding {
Port = 80
# Interface = 127.0.0.1
MaxKeepAlive = 30
TimeForRequest = 3,20
}
Step 5a (Optional for security purpose) :
Add the following line at the
GENERAL SETTINGS
. ConnectionsTotal = 1000
ConnectionsPerIP = 30
SystemLogfile = /var/log/hiawatha/system.log
GarbageLogfile = /var/log/hiawatha/garbage.log
ExploitLogfile = /var/log/hiawatha/exploit.log
LogFormat = extended
ServerString = Apache
CGIwrapper = /usr/sbin/cgi-wrapper
Make changes for the following entries at
BANNING SETTINGS
. BanOnGarbage = 300
BanOnMaxPerIP = 300
BanOnMaxReqSize = 300
BanOnTimeout = 300
KickOnBan = yes
RebanDuringBan = yes
BanOnDeniedBody = 300
BanOnSQLi = 300
BanOnFlooding = 30/1:300
BanlistMask = deny 192.168.0.0/24, deny 127.0.0.1
BanOnInvalidURL = 300
ReconnectDelay = 3
#Reverse Proxy
HideProxy = 127.0.0.1
MaxServerLoad = 0.8
Step 5b :
The entries at
COMMON GATEWAY INTERFACE (CGI) SETTINGS
should be looking like this.CGIhandler = /usr/bin/perl:pl
CGIhandler = /usr/bin/php5-cgi:php
CGIhandler = /usr/bin/python:py
CGIhandler = /usr/bin/ruby:rb
CGIhandler = /usr/bin/ssi-cgi:shtml
CGIextension = cgi
FastCGIserver {
FastCGIid = PHP5
ConnectTo = 127.0.0.1:9000
Extension = php, php5
SessionTimeout = 30
}
Step 5c :
Add the following line at
VIRTUAL HOSTS
.Include /etc/hiawatha/enable-sites/
*Make sure the make a directory
enable-sites
and disable-sites
under /etc/hiawatha
.sudo mkdir /etc/hiawatha/enable-sites
sudo mkdir /etc/hiawatha/disable-sites
Step 6 - Configure Hiawatha (Part 2)
If your domain is mysite.com, you are required to create a file namely
mysite.com
and place it under /etc/hiawatha/enable-sites/mysite.com
.*** You can ignore the "
DenyBot
" entries when you want the search engines to find your site easily.*** If you do not implement "Step 7" below, please do not add "WrapCGI = Jail_mysite".
*** "
PreventSQLi
" is set to "yes
" when your web application is vulnerable to SQL Injection and you cannot fix it at the moment.Furthermore, if you want to disable this virtual site, you can move the "
mysite.com
" to /etc/hiawatha/disable-sites/
and then restart hiawatha server.sudo mv /etc/hiawatha/enable-sites/mysite.com /etc/hiawatha/disable-sites/
sudo /etc/init.d/hiawatha restart
Step 7 - Configure Hiawatha (Part 3) (Optional for security purpose)
sudo nano /etc/hiawatha/cgi-wrapper.conf
CGIhandler = /usr/bin/perl
CGIhandler = /usr/bin/php5-cgi
CGIhandler = /usr/bin/python
CGIhandler = /usr/bin/ruby
CGIhandler = /usr/bin/ssi-cgi
Wrap = jail_mysite ; /var/www/mysite ; www-data:www-data
Step 8 - Configure Apparmor (Optional for security purpose)
Install the following packages :
sudo apt-get install apparmor-profiles apparmor-utils
Execute the following command and then let the web site running for a while, maybe a week or so.
sudo aa-genprof hiawatha
About one week later or the web page/site is misbehaving, issue the following command to update the profile. Remember to reload the profile after the command has been issued.
sudo aa-logprof
Or, if you are impatient, you can edit the following file instead.
sudo nano /etc/apparmor.d/usr.sbin.hiawatha
The content of
usr.sbin.hiawatha
should look like this or make it look like this.Make the profile in enforce mode (activate the above settings).
sudo aa-enforce hiawatha
If you have change some settings, you should reload the profile.
sudo apparmor_parser -r < /etc/apparmor.d/usr.sbin.hiawatha
If you want to disable this profile.
sudo ln -s /etc/apparmor.d/usr.sbin.hiawatha /etc/apparmor.d/disable/
sudo apparmor_parser -R < /etc/apparmor.d/usr.sbin.hiawatha
If you want to re-enable this profile after it has been disabled.
sudo rm /etc/apparmor.d/disable/usr.sbin.hiawatha
sudo apparmor_parser -r < /etc/apparmor.d/usr.sbin.hiawatha
Step 9 - Enhance the security of cgi-wrapper (Optional for security purpose)
Now, your hiawatha is very secure but I would like to make it more secure.
sudo apt-get install libcap2-bin
Apply Capabilities on cgi-wrapper.
sudo chmod u-s /usr/sbin/cgi-wrapper
sudo setcap cap_setgid,cap_setuid+ep /usr/sbin/cgi-wrapper
The result of getcap :
sudo getcap /usr/sbin/cgi-wrapper
It will display :
/usr/sbin/cgi-wrapper = cap_setgid,cap_setuid+ep
Step 10 - Configure logwatch (Optional)
Please refer to this link to make the LogWatch to know your Hiawatha webserver's log files.
Please make sure to re-do this step when the logwatch is updated or upgraded as it will overwrite the configure file.
Step 11 - Change the ownership of the log files
cd /var/log/hiawatha
sudo chown www-data:www-data access.log
sudo chown www-data:www-data error.log
sudo chown www-data:www-data exploit.log
sudo chown www-data:www-data garbage.log
sudo chown root:root system.log
* "
php-fcgi.log
" and "system.log
" leave them untouched (root:root).Step 11a - Change ownership of all directories and files at the /var/www/mysite
Put the web application files to /var/www/mysite and then change the ownership of all directories and files under /var/www/mysite to root:root.
cd /var/www/mysite
sudo chown -R root:root *
Step 12 - Start, Stop and Restart Hiawatha
sudo /etc/init.d/hiawatha start
sudo /etc/init.d/hiawatha stop
suod /etc/init.d/hiawatha restart
Step 13 - Performance tuning for MySQL or Percona Server (Optional)
You can fine tune the MySQL as per this link.
Step 14 - Secure your Ubuntu Server in a passive way (Optional)
Please refer to this link to secure your server in a passive way.
Step 15 - Setup a FTP server on Ubuntu Server (Optional)
This link shows you how to setup a vsFTPd server.
Step 16 - URL Rewrite rules (Optional)
For the url rewrite rules for your PHP applications, please refer to this link
Make sure you add "UseToolkit" at the VirtualHost section.
Step 17 - Send email to GMail via Postfix (Optional)
Please refer to this link
Step 18 - Create normal user for MySQL or MariaDB as well as Percona Server (Optional)
Please refer to this link
Remarks :
If you encounter "
500 Internal Server Error
", you may consider to make the Apparmor to "Complain mode
".sudo aa-complain hiawatha
After several days browsing the website, you may consider to turn the Apparmor to "
Enforce mode
".sudo aa-logprof
sudo aa-enforce hiawatha
It is because the captioned
usr.sbin.hiawatha
may not 100% work for you.In order to further hardened your Hiawatha web server, please consider the following options :
Optional #1 :
For SSH connection security, you also may consider to implement the Port Knocking feature.
sudo apt-get install knockd
Optional #2 :
You may also consider to enable your firewall at your router or on the Hiawatha Web Server with UFW.
If ufw does not exist in your server, you can install it :
sudo apt-get install ufw
Optional #3 :
Consider to install Suricata IPS on your server.
That's all! See you.
All You Need Is... The Love Mob
We often take love for granted. We forget that it's not just a feeling, but a verb. Love isn't always about romance or passion, but it's about actively caring about your fellow humans. There are people who rarely get to experience it, so the Love Mob was created to remind us all that love exists. Here's how it works...
P.S. If you're in LA this weekend, come out to Skid Row and lend a hand. We're meeting just before noon on San Julian. Bring some goodies to donate and bring a friend too. One love!
On Fire: Geometric Lace Bra & Knickers
Oftentimes ladies get new lingerie on Valentine's Day from a boyfriend, husband, or boy toy. But why wait for a man to get you what you want? This triangle shaped bra with matching panties are perfectly priced for the frugal fashionista at only $36 for the set. Delicate lace detailing with a contrasting black band combine to make this look sweet and spicy. I can just imagine wearing this and dancing around my apartment while I make sexy faces in the mirror. I don't need an audience. On second thought, if you're cute, witty, and happen to appreciate my silly dance moves, you're welcome to watch. But don't kill my vibe. So back to these lacey knickers, you know what to do...
CLICK HERE TO SHOP
My Style: Soda Fountain Sweetie
Jumpsuit: Scoop Jeans (similar)
Necklace: Melody Ehsani
Scarf: Thrift Shop
Bracelets: From a Spanish Street Market
Nail Wraps: Maybelline
Xoxo
At Your Finger Tips
The best part is... the app is FREE! Say what?! Yes lovelies, it's free. Check it out and get while it's hot.
Click Here for more info.
My Style: Straight Chillin'
Jacket: Stylist's own (similar)
Jeans: Levi's
Skull Cap: Borrowed from Photographer (similar)
Sunglasses: AJ Morgan "Outer Limits"
Styling by Pei Lee
Makeup by Sheba Snow
Run Around Town Like A Model
Whether I'm New York, Milan, or LA, it's always the same story. I'm criss-crossing the city trying to make it to every casting or audition I possibly can to book a job. When I leave my place in the morning, there's no guarantee I'll be able to come back between appointments. So I have to pack for the day and pack light. I'm like Mary Poppins when it comes to my model bag. I've got a toothbrush and toothpaste, my beauty kit, a little black dress, heels, a bikini, my iPad, the kitchen sink. You never know exactly what you'll need for the day, so you have to take almost everything. Make sure your beauty kit includes makeup wipes, moisturizer, eye cream, concealer, blush, and mascara. It never fails, halfway through my adventure I'll start to look tired. That's when I wipe off all the grime and start anew. Refrain from piling on the makeup. It will only make your face look weighed down. Keep it light by adding a little concealer or eye brightener for your peepers and add a pop of color on your cheeks. You'll go from looking old and haggard to young and fresh.
When you're a working model or actress, every single day is a chance to book a campaign or commercial that could make your career. Don't let your dreams slip away from you because you're tired of the hustle. Go to every casting you can. Seize those opportunities by looking your best and being ready for a challenge. Keep your look simple and polished. Pack whatever tools you need for success. And don't let anything slow you down on your mission. I know it seems like I'm screaming out commands, but I'm so excited for what you actually will achieve. You are a shooting star, and I can't wait to see you take off. Zoom!
HOWTO : Secure Apache on Ubuntu Server 12.04 LTS
Step 1 :
Step 2 :
Set "
Step 3 :
Append the following line, where "SamiuxHTTP" is an example and you can change to your desire.
Step 4 :
Step 5 :
Add the following right before "" :
Step 6 :
Change the following from :
to :
Add the following line before and save the file :
Step 7 :
Remark
Make sure your domain name is not an IP address; otherwise, the mod_security will block it.
That's all! See you.
sudo apt-get update
sudo apt-get install apache2-utils libapache-mod-security libapache2-mod-evasive
Step 2 :
sudo cp /etc/modsecurity/modsecurity.conf-recommended /etc/modsecurity/modsecurity.conf
sudo nano /etc/apache2/conf.d/security
Set "
ServerTokens
" to "Full
".Step 3 :
sudo cp /etc/modsecurity/modsecurity.conf-recommended /etc/modsecurity/modsecurity.conf
sudo nano /etc/modsecurity/modsecurity.conf
Append the following line, where "SamiuxHTTP" is an example and you can change to your desire.
SecServerSignature SamiuxHTTP
Step 4 :
sudo mkdir /var/log/mod_evasive
sudo chown www-data:www-data /var/log/mod_evasive/
Step 5 :
sudo nano /etc/apache2/sites-enabled/000-default
Add the following right before "" :
RewriteEngine On
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]
DOSHashTableSize 3097
DOSPageCount 2
DOSSiteCount 50
DOSPageInterval 1
DOSSiteInterval 1
DOSBlockingPeriod 60
DOSLogDir /var/log/mod_evasive
DOSEmailNotify samiux@gmail.com
DOSWhitelist 127.0.0.1
Step 6 :
sudo nano /etc/modsecurity/modsecurity.conf
Change the following from :
SecRuleEngine DetectionOnly
to :
SecRuleEngine On
cd /etc/modsecurity
sudo mkdir activated_rules
sudo wget http://downloads.sourceforge.net/project/mod-security/modsecurity-crs/0-CURRENT/modsecurity-crs_2.2.5.tar.gz
sudo tar -zxvf modsecurity-crs_2.2.5.tar.gz
cd modsecurity-crs_2.2.5
sudo cp modsecurity_crs_10_setup.conf.example /etc/modsecurity/modsecurity_crs_10_setup.conf
cd /etc/modsecurity/modsecurity-crs_2.2.5/base_rules
for f in * ; do sudo ln -s /etc/modsecurity/modsecurity-crs_2.2.5/base_rules/$f /etc/modsecurity/activated_rules/$f ; done
cd /etc/modsecurity/modsecurity-crs_2.2.5/optional_rules
for f in * ; do sudo ln -s /etc/modsecurity/modsecurity-crs_2.2.5/optional_rules/$f /etc/modsecurity/activated_rules/$f ; done
sudo nano /etc/apache2/mods-available/mod-security.conf
Add the following line before and save the file :
Include "/etc/modsecurity/activated_rules/*.conf"
Step 7 :
sudo a2enmod mod-security
sudo a2enmod mod-evasive
sudo a2enmod headers
sudo /etc/init.d/apache2 restart
Remark
Make sure your domain name is not an IP address; otherwise, the mod_security will block it.
That's all! See you.
Subscribe to:
Posts (Atom)