Anthony Towns writes about using an improved version of jigdo to download CD/DVD images . His improvement is basically to pipeline operation for better performance.
Jigdo (the Jigsaw download) is a tool to download a set of files and then use them to create a CD or DVD image . The idea is that most […]
Patrick Winnertz writes about the demotivating effect of unreasonable delays on joining the Debian project .
While I agree that things need to be improved in terms of getting people in the project in a timely manner (the suggestion of providing assistants seems good), I don’t think that anyone has a good reason for being […]
Uwe Hermann has described how to resize a root filesystem after booting from a live-cd or recovery disk . He makes some good points about resizing an LVM PV (which I hadn’t even realised was possible).
The following paragraph is outdated, see the update at the end: Incidentally it should be noted that if your […]
Albert writes about software development and how much teamwork is used . He makes an interesting clash of analogies by suggesting that it’s not a “team sport” because “its not like commercial fishing where many hands are used to pull in the net at the same time“.
I think that software development for any non-trivial […]
Steve Kemp writes about security issues with C programs . It seems obvious that if you are going to do something that is overly tricky (such as anything related to setuid programs) then you should have a good knowledge of what you are doing. Steve goes a little further and suggests that anyone who doesn’t […]
I had an old Compaq Athlon 1GHz system that seemed to be broken. It would display random things on the screen from the BIOS and fail the boot, it looked like a motherboard problem. Fortunately before I gave it away (I give away all my broken machines to members of my local LUG who want […]
Using the “ulimit” controls over process resource use it is possible to limit RAM for processes and to limit the number of processes per UID. The problem is that this often is only good for accidental problems not dealing with malicious acts.
For a multi-user machine each user needs to be allowed to have two […]
When previously writing about how I partition disks  I mentioned that I use smaller RAID partitions than the maximum size to reduce reconstruction time in the event of a crash.
Linux software RAID has a feature known as write intent bitmaps which means that every time some data is about to be written the […]
I’ve just been working with a Flash device used as /dev/hda (the root filesystem) for a router. The aim is much the same as with my idea of using an EeePC as a router . The client in question may consider the EeePC for future deployments but are concerned about the ability of ASUS to […]
Having had a number of hard drives fail over the years I use RAID whenever possible to reduce the probability of data loss caused by hardware failure. It’s unfortunate that some machines make it impractically difficult to install a second hard drive (my laptop and some small form factor desktop machines I have given to […]