|
|
A question that is often asked is whether to use SE Linux or a chroot to restrict a program.
In Unix chroot is a way of running a program with a restricted set of directories available (it used to be merely a sub-tree but with bind mounts it can be any arbitrary set of directory […]
I’ve been thinking about music videos recently while compiling a list of my favourite videos of all time. It seems that YouTube has changed things through the re-mixes of videos and the ability of anyone to publish for a mass-market (although without the possibility of directly making money from it).
Also today all new PCs […]
Recently someone asked on IRC whether they should use SE Linux on a web server machine (that is being used for no other purpose) and then went on to add “since the webserver is installed as root anyway“.
If a machine is used to run a single non-root application then the potential benefits of using […]
One problem with the blog space is that there is a lot of negativity. Many people seem to think that if they don’t like a blog post then the thing to do is to write a post complaining about it – or even worse a complaint that lacks specific details to such an extent that […]
For a while I used the Item Link Clicks feature in Feedburner. For those who aren’t aware Feedburner is a service that proxies access to an RSS feed (you need to either publish the Feedburner URL as the syndication link or use a HTTP redirect to send the requests there – I use a HTTP […]
One situation that you will occasionally encounter when running a Heartbeat cluster is a need to prevent a STONITH of a node. As documented in my previous post about testing STONITH the ability to STONITH nodes is very important in an operating cluster. However when the sys-admin is performing maintenance on the system or programmers […]
On about 5 years I attended the conference The Colorado Software Summit. The first one was the last conference under the old name (ColoradOS/2) but then as OS/2 was rapidly losing market share and the conference delegates changed their programming interests it changed to become a Java conference.
The Colorado Software Summit rapidly became known […]
The site noonebelongsheremorethanyou.com is an advert for a book of short stories. The web site is funny and quirky (two qualities that are required for a site to become virally popular), works well on all browser sizes, has a navigation method that is unique (or at least something I don’t recall seeing done so well […]
In the IP protocol stack the lowest level protocol is ARP (the Address Resolution Protocol). ARP is used to request the Ethernet hardware (MAC) address of the host which owns a particular IP address.
# arping 192.168.0.43 ARPING 192.168.0.43 60 bytes from 00:60:b0:3c:62:6b (192.168.0.43): index=0 time=339.031 usec 60 bytes from 00:60:b0:3c:62:6b (192.168.0.43): index=1 time=12.967 msec […]
I read an interesting post on Advogato about IT recruiting agencies (along with an interesting preface about medical treatment for broken ribs).
Their report closely mirrored my experience in many ways. Here are what I consider to be the main points for a job applicant dealing with recruiters:
Ask more than you believe that you […]
|
|