|
|
Matt Bottrell writes about the Oracle Linux offerings presented at LCA 2008 [1]
The one thing that Oracle does which I really object to is the “unbreakable” part of their advertising. They have pictures of penguins in armour and the only reasonable assumption is that their system is more secure in some way. As far […]
Matt Bottrell wrote an interesting and informative post about laptops for school kids [1]. His conclusion is that based on technical features the OLPC machine is best suited for primary school children and one of the ASUS EeePC, the Intel Classmate, and the Everex Cloudbook would be best suited for high-school students.
The Asus EeePC […]
Finally I found the URL of a device I’ve been hearing rumours about. The HotPlug is a device to allow you to move a computer without turning it off [1]. It is described as being created for “Government/Forensic customers” but is also being advertised for moving servers without powering them down.
The primary way that […]
I was watching the British police drama show The Bill [1] and I was impressed by their use of computers.
They were analysing the evidence of a homicide and one of the tasks was to assemble a time-line of the related events. They had a projector connected to a computer which displayed the data and […]
It is becoming increasingly apparent that this post is not going to do any good, so I have deleted the content.
Sorry to the people who were offended.
I won’t be writing about such topics again.
Related posts:
Blog Copyright Infringement I have previously written about some of my efforts to… Blogroll – Bad Social Networking A common feature in blog software is a Blogroll, this…
Currently in the US the main political parties are deciding who will contest the next presidential election. Naturally this gets some commentary from all sides.
Planet Debian has syndicated two blog posts commenting on these issues, it’s interesting to compare them:
First John Goerzen writes a post about an issue he (and almost everyone in […]
Using the “ulimit” controls over process resource use it is possible to limit RAM for processes and to limit the number of processes per UID. The problem is that this often is only good for accidental problems not dealing with malicious acts.
For a multi-user machine each user needs to be allowed to have two […]
On the 20th of January (8 days before the start of linux.conf.au) I advertised contest to write blog posts related to computer security for the conference Planet [1].
The aim of the contest was to encourage (by money prizes) people who had no prior experience in computer security to get involved by writing blog posts. […]
This year at Linux.Conf.Au there was a student party sponsored by Google. The party was held in a bar and lots of free drinks were provided. This was fine for the university students, but for school kids it was obviously lacking.
Some people point out that it’s “quite legal” to run a party that excludes […]
It seems that my blogging contest idea is a failure. Could the interested people please meet me near the LCA registration desk at the start of the lunch breakh today for a post-mortem.
Any last-minute entries can be submitted by telling me the URL then.
Related posts:
LCA 2008 Security Blogging Contest I have decided to run a contest for security related…
Change of Rules for the Blogging Contest Due to the lack of entries so far I am…
LCA 2008 Security Miniconf Today I gave a talk about Debian security at the…
Blogger is Not for Serious Blogging When I started blogging I used Blogger [1]. After some…
blogging software Previously I asked for advice about running an Intranet blog,…
|
|