John Howard is bizarreJohn Howard is bizarre
Our despicable prime minister said “I think that would just encourage those who wanted completely to destabilise and destroy Iraq, and create chaos and victory for the terrorists to hang[...]
Our despicable prime minister said “I think that would just encourage those who wanted completely to destabilise and destroy Iraq, and create chaos and victory for the terrorists to hang[...]
Wouter wrote an interesting post about names. I wonder how many people know me as Russell SELinux… No related posts.[...]
Ulrich Drepper has written a good web page about text relocation which is most often noticed as execmod failures reported when running SE Linux. When an AVC message reports a[...]
One of the benefits of Xen is that it allows a machine to be easily rebooted. Remote console and remote power management technologies are either expensive or implemented on the[...]
Recently I had someone call my mobile phone asking whether I wanted to change phone providers. I asked them if they could hold the line – then I put my[...]
One of the most obvious (and yet most common) computer security mistakes is to take input from an untrusted (and potentially hostile) source. A classic example of this is in[...]
On a Debian mailing list someone claimed that it was inconvenient to use ssh tunneling for sending and receiving email due to the issue of broken connections. On my source-dump[...]
service smtps { disable = no socket_type = stream wait = no user = USER server = /usr/bin/ssh server_args = USER@HOST -C /home/USER/bin/localsmtp bind = 127.0.0.1 } service pop2 {[...]
I suggested in a previous blog entry that conferences should provide computers that speakers can use for their presentations. The reason for this is that getting one computer working with[...]
Recently someone asked me for advice on what they can do to improve their career without getting a degree. I have performed a quick poll of some people I know[...]