General Info
girls really *do* have cooties… See?? Told ya…
by Brian on Nov.05, 2008, under Amusement
Interesting read from the Discovery Channel.
Girls carry more bacteria…
Asked if guys should worry about holding hands with girls, Knight said: “I guess it depends on which girl.”

RAID 5, we hardly knew ye.
by Brian on Oct.21, 2008, under General Info
We all knew this day would come, when RAID 5 will cease to be. OK, maybe not all, but I had a sneaking suspicion that super-large hard drives would be the end of RAID 5.
Check out this article about it.
Oh, and start hinting around about a budget for a fiber-channel SAN, while you’re at it.
DRM-Free MP3s from Amazon.com
by Brian on Oct.03, 2008, under Amusement
2 Comments :Amusement more...I passed 000-078!!
by Brian on Sep.30, 2008, under General Info
I passed the 000-078 IBM BladeCenter v4 certification exam this afternoon.
This marks the 15th time I’ve pressed “Finish” at a Prometric testing facility.
All in all, this was the most difficult test I’ve taken, with the possible exception of the Microsoft ISA exam for my MCSE :Security & :Messaging.
So now, I have so many certs, they’d look silly all on a business card together at the same time!
So, just for grins, here’s what they look like all together:
Watchguard Certified Security Professional – Fireware
Microsoft Certified Systems Administrator 2003
Microsoft Certified Systems Administrator :Messaging
Microsoft Certified Systems Administrator :Security
Microsoft Certified Systems Engineer 2003
Microsoft Certified Systems Engineer :Messaging
Microsoft Certified Systems Engineer :Security
Microsoft Certified Technology Specialist – Windows Server 2008 (one test from MCITP)
IBM Certified Systems Specialist – IBM System x BladeCenter v4
Still working on EC Council’s CEH, and thinking of taking up CISSP.
Anyone have any input regarding certs you’ve achieved, or ones that have done your career no good whatsoever?
CryptedNets theme keeps changing…
by Brian on Sep.02, 2008, under Amusement
What do you think? Do you care?
Is everyone just reading the RSS feed anyway?
Does it matter to you in the slightest?
As evidenced by the stats, at least *some* people are reading…
What do you think?
Dead CMOS batteries suck.
by Brian on Aug.27, 2008, under General Info
Sorry folks.
The power grid up here in Princel-tucky isn’t *extremely* reliable.
Pressed F1. Continued. Back online.
Remedial Source Code Building and apt-get Usage.
by Brian on Aug.05, 2008, under General Info, Linux
If you’re going to be compiling source code on a Ubuntu Linux box, there are certain programs you need that *aren’t* installed by default. The most important part is the compiler. You need at least a C compiler. You can install the C compiler using apt-get. Apt-get is a program built into Ubuntu for fetching and compiling and installing source code from the web. Your Ubuntu machine needs to be online to use it. (try this at a shell prompt: man apt-get )
To install the compiler toolchain, issue this command.
sudo apt-get install build-essential
When you find that you cannot use the program (say, rdesktop-1.5.0) that came with your linux distribution, you should try to build it yourself from source. This seems a pretty easy task for some, but remember the first time you encountered a filename.tar.gz file? Did you gunzip it first, wondering what you should do to extract your prize from this filename.tar file? Anyway, here’s a brief rundown of what you would need to do to build rdesktop-1.6.0 from source on a freshly installed Ubuntu Linux box. After downloading your source file (rdesktop-1.6.0.tar.gz), it should be in your home directory. We’ll assume that your name is Bob, OK?
cd /home/bob (changes to your home directory. You’re Bob, remember?)
tar -zxvf rdesktop-1.6.0.tar.gz (this will decompress and un-tar the source files)
cd rdesktop-1.6.0Â (this changes your current directory into the extracted source directory)
./configure (this builds the Makefile)
make (make turns the source into a compiled binary)
sudo make install (this places the program onto your userland filesystem, using root privileges.)
Google shell application is *really cool*
by Brian on Jun.04, 2008, under General Info
There’s a new way to search Google’s massive indexes. It’s called the Google Shell. You can find it at http://goosh.org Try it right now.. It’s basically a very UNIX-like way to search Google. You can use UNIX-ish commands to search. Try it!
My list of banned mail servers
by Brian on Sep.16, 2007, under General Info
Just in case anyone cares, here’s the list of servers I refuse to accept mail from. This is a very large list, (over 22,500 hosts and networks) and is fairly restrictive. It covers all IP address space in China, Korea, most of Holland, and many others that have spammed my servers.
If you find yourself listed here, don’t email me. I don’t care. It’s my mailserver, and I’ll accept mail from whomever I please. Â :PÂ Â
P.S. If you are listed here by individual IP address, you suck. Stop spamming people. Loser.
Anyway, here’s the list:
https://cryptednets.org/bannedmailservers.csv
If you use OpenBSD’s PF, and want to use it in a table, copy the list to “/etc/bannedmail” and then you can add the list like so:
# pfctl -t <bannedmail> -T add `cat /etc/bannedmail`
then, just disallow these IP’s from connecting to your mail server:
First, add the table to the pf.conf:
table <bannedmail> persist file "/etc/bannedmail"
and
block drop in quick on $ext_if from <bannedmail> to any
or
rdr on $ext_if proto tcp from !<bannedmail> to $ext_if port 25Â -> $mailserver port 25
Just in case you've forgotten…
by Brian on May.31, 2007, under General Info
The 10 Immutable Laws of Computer Security
- If a bad guy can persuade you to run his program on your computer, it’s not your computer any more.
- If a bad guy can alter the operating system on your computer, it’s not your computer any more.
- If a bad guy has unrestricted physical access to your computer, it’s not your computer any more.
- A computer is only as secure as the administrator is trustworthy.
- Weak passwords trump strong security.
- Encrypted data is only as secure as the decryption key.
- An out of date virus scanner is only marginally better than no virus scanner at all.
- If you allow a bad guy to upload programs to your website, it’s not your website any more.
- Absolute anonymity isn’t practical, in real life or on the Web.
- Technology is not a panacea.