Archives

Categories

John Howard is bizarre

Our despicable prime minister said “I think that would just encourage those who wanted completely to destabilise and destroy Iraq, and create chaos and victory for the terrorists to hang on and hope for (an) Obama victory“.

That statement is wrong in many ways, firstly the US (with Australian help) has destabilised and destroyed Iraq […]

names

Wouter wrote an interesting post about names. I wonder how many people know me as Russell SELinux…

No related posts.

execmod

Ulrich Drepper has written a good web page about text relocation which is most often noticed as execmod failures reported when running SE Linux. When an AVC message reports a failure of execmod against a shared object it means that the object has text relocations (the shared object code writes to code that it executes […]

xen and yoyo

One of the benefits of Xen is that it allows a machine to be easily rebooted. Remote console and remote power management technologies are either expensive or implemented on the motherboards of expensive machines. With Xen the virtual machines can be managed without such expense and also with less effort.

This raises immediate possibilities for […]

phone spam

Recently I had someone call my mobile phone asking whether I wanted to change phone providers. I asked them if they could hold the line – then I put my phone down and went back to work.

It took over eight minutes before they hung up on me.

Next time someone phone-spams you try to […]

classic security mistake

One of the most obvious (and yet most common) computer security mistakes is to take input from an untrusted (and potentially hostile) source. A classic example of this is in Windows Vista where audio output from the system speakers can be taken as input to the speech recognition system. According to the BBC article an […]

ssh tunneling of email

On a Debian mailing list someone claimed that it was inconvenient to use ssh tunneling for sending and receiving email due to the issue of broken connections.

On my source-dump blog I have posted an entry with xinetd configuration for doing this in a reliable manner.

Related posts:

source dump blog Inspired by Julien Goodwin‘s post I created a new blog…
how to run dynamic ssh tunnels service smtps { disable = no socket_type = stream wait…
email disclaimers Andre Pang blogs about the annoyance of email disclaimers. For…
mailing list culture There is currently a big debate in progress in Debian….

how to run dynamic ssh tunnels

service smtps { disable = no socket_type = stream wait = no user = USER server = /usr/bin/ssh server_args = USER@HOST -C /home/USER/bin/localsmtp bind = 127.0.0.1 } service pop2 { disable = no socket_type = stream wait = no user = USER server = /usr/bin/ssh server_args = USER@HOST -C /home/USER/bin/localpop bind = 127.0.0.1 }

I […]

presentation laptops

I suggested in a previous blog entry that conferences should provide computers that speakers can use for their presentations. The reason for this is that getting one computer working with the beamer in each room is an easy task, while getting the laptop of every speaker to work is much more difficult.

It seems that […]

university degrees

Recently someone asked me for advice on what they can do to improve their career without getting a degree.

I have performed a quick poll of some people I know and found that for experienced people there seems to be little need for a degree. People who have extensive experience but no degree report no […]