booting from USB for securitybooting from USB for security
Sune Vuorela asks about how to secure important data such as GPG keys on laptops. I believe that the ideal solution involves booting from a USB device with an encrypted[...]
Sune Vuorela asks about how to secure important data such as GPG keys on laptops. I believe that the ideal solution involves booting from a USB device with an encrypted[...]
Jesus Climent writes about donating laptops. Free Thinkpad I have a Thinkpad 385xd laptop to give away for free. It has a PentiumMMX-233 CPU, 96M of RAM, a 3.2G IDE[...]
I have just installed a machine running CentOS 5 as a Xen server. I installed a full GUI environment on the dom0 so that GUI tools can be used for[...]
I have just updated my previous post about licenses and also explicitely licensed my blog. Previously I had used a Creative-Commons share-alike license for lecture notes to allow commercial use[...]
Leon Brooks blogged about the Right to Fork (an essential right for free software development) but notes that governments of countries don’t permit such a right. One of the criteria[...]
Paul Dwerryhouse posted a comment about the Prime Minister asking people to pray for rain. I don’t think that Johnny is suggesting this because he’s overly religious (compare his actions[...]
Alan Robertson (a major contributor to the Heartbeat project) commented on my post failure probability and clusters. His comment deserves wider readership than a comment generally gets so I’m making[...]
A comment on my post about the failure probability of clusters suggested that a six node cluster that has one node fail should become a five node cluster. The problem[...]
When running a high-availability cluster of two nodes it will generally be configured such that if one node fails then the other runs. Some common operation (such as accessing a[...]
We are having a release party on Saturday the 14th of April. We meet at mid-day under the clocks at Flinders Street Station and then go somewhere convenient and not[...]