phone spamphone spam
Recently I had someone call my mobile phone asking whether I wanted to change phone providers. I asked them if they could hold the line – then I put my[...]
Recently I had someone call my mobile phone asking whether I wanted to change phone providers. I asked them if they could hold the line – then I put my[...]
One of the most obvious (and yet most common) computer security mistakes is to take input from an untrusted (and potentially hostile) source. A classic example of this is in[...]
On a Debian mailing list someone claimed that it was inconvenient to use ssh tunneling for sending and receiving email due to the issue of broken connections. On my source-dump[...]
service smtps { disable = no socket_type = stream wait = no user = USER server = /usr/bin/ssh server_args = USER@HOST -C /home/USER/bin/localsmtp bind = 127.0.0.1 } service pop2 {[...]
I suggested in a previous blog entry that conferences should provide computers that speakers can use for their presentations. The reason for this is that getting one computer working with[...]
Recently someone asked me for advice on what they can do to improve their career without getting a degree. I have performed a quick poll of some people I know[...]
While attending LCA it occurred to me that the lecture notes from all the talks that I have given lack a copyright notice. So I now retrospectively license my lecture[...]
Today I have released a significant new version of my mail server benchmark Postal! The list of changes is below: Added new program bhm to listen on port 25 and[...]
It appears that some people don’t understand what right-wing means in terms of politics, apart from using it as a general term of abuse. I recommend visiting the site http://www.politicalcompass.org/[...]
This morning at LCA Andrew Tanenbaum gave a talk about Minix 3 and his work on creating reliable software. He cited examples of consumer electronics devices such as TVs that[...]