SE Linux vs chrootSE Linux vs chroot
A question that is often asked is whether to use SE Linux or a chroot to restrict a program. In Unix chroot is a way of running a program with[...]
A question that is often asked is whether to use SE Linux or a chroot to restrict a program. In Unix chroot is a way of running a program with[...]
I’ve been thinking about music videos recently while compiling a list of my favourite videos of all time. It seems that YouTube has changed things through the re-mixes of videos[...]
Recently someone asked on IRC whether they should use SE Linux on a web server machine (that is being used for no other purpose) and then went on to add[...]
One problem with the blog space is that there is a lot of negativity. Many people seem to think that if they don’t like a blog post then the thing[...]
For a while I used the Item Link Clicks feature in Feedburner. For those who aren’t aware Feedburner is a service that proxies access to an RSS feed (you need[...]
One situation that you will occasionally encounter when running a Heartbeat cluster is a need to prevent a STONITH of a node. As documented in my previous post about testing[...]
On about 5 years I attended the conference The Colorado Software Summit. The first one was the last conference under the old name (ColoradOS/2) but then as OS/2 was rapidly[...]
The site noonebelongsheremorethanyou.com is an advert for a book of short stories. The web site is funny and quirky (two qualities that are required for a site to become virally[...]
In the IP protocol stack the lowest level protocol is ARP (the Address Resolution Protocol). ARP is used to request the Ethernet hardware (MAC) address of the host which owns[...]
I read an interesting post on Advogato about IT recruiting agencies (along with an interesting preface about medical treatment for broken ribs). Their report closely mirrored my experience in many[...]