General Info
RAID 5, we hardly knew ye.
by Brian on Oct.21, 2008, under General Info
We all knew this day would come, when RAID 5 will cease to be. OK, maybe not all, but I had a sneaking suspicion that super-large hard drives would be the end of RAID 5.
Check out this article about it.
Oh, and start hinting around about a budget for a fiber-channel SAN, while you’re at it.
DRM-Free MP3s from Amazon.com
by Brian on Oct.03, 2008, under Amusement
2 Comments :Amusement more...I passed 000-078!!
by Brian on Sep.30, 2008, under General Info
I passed the 000-078 IBM BladeCenter v4 certification exam this afternoon.
This marks the 15th time I’ve pressed “Finish” at a Prometric testing facility.
All in all, this was the most difficult test I’ve taken, with the possible exception of the Microsoft ISA exam for my MCSE :Security & :Messaging.
So now, I have so many certs, they’d look silly all on a business card together at the same time!
So, just for grins, here’s what they look like all together:
Watchguard Certified Security Professional – Fireware
Microsoft Certified Systems Administrator 2003
Microsoft Certified Systems Administrator :Messaging
Microsoft Certified Systems Administrator :Security
Microsoft Certified Systems Engineer 2003
Microsoft Certified Systems Engineer :Messaging
Microsoft Certified Systems Engineer :Security
Microsoft Certified Technology Specialist – Windows Server 2008 (one test from MCITP)
IBM Certified Systems Specialist – IBM System x BladeCenter v4
Still working on EC Council’s CEH, and thinking of taking up CISSP.
Anyone have any input regarding certs you’ve achieved, or ones that have done your career no good whatsoever?
CryptedNets theme keeps changing…
by Brian on Sep.02, 2008, under Amusement
What do you think? Do you care?
Is everyone just reading the RSS feed anyway?
Does it matter to you in the slightest?
As evidenced by the stats, at least *some* people are reading…
What do you think?
Dead CMOS batteries suck.
by Brian on Aug.27, 2008, under General Info
Sorry folks.
The power grid up here in Princel-tucky isn’t *extremely* reliable.
Pressed F1. Continued. Back online.
Remedial Source Code Building and apt-get Usage.
by Brian on Aug.05, 2008, under General Info, Linux
If you’re going to be compiling source code on a Ubuntu Linux box, there are certain programs you need that *aren’t* installed by default. The most important part is the compiler. You need at least a C compiler. You can install the C compiler using apt-get. Apt-get is a program built into Ubuntu for fetching and compiling and installing source code from the web. Your Ubuntu machine needs to be online to use it. (try this at a shell prompt: man apt-get )
To install the compiler toolchain, issue this command.
sudo apt-get install build-essential
When you find that you cannot use the program (say, rdesktop-1.5.0) that came with your linux distribution, you should try to build it yourself from source. This seems a pretty easy task for some, but remember the first time you encountered a filename.tar.gz file? Did you gunzip it first, wondering what you should do to extract your prize from this filename.tar file? Anyway, here’s a brief rundown of what you would need to do to build rdesktop-1.6.0 from source on a freshly installed Ubuntu Linux box. After downloading your source file (rdesktop-1.6.0.tar.gz), it should be in your home directory. We’ll assume that your name is Bob, OK?
cd /home/bob (changes to your home directory. You’re Bob, remember?)
tar -zxvf rdesktop-1.6.0.tar.gz (this will decompress and un-tar the source files)
cd rdesktop-1.6.0Â (this changes your current directory into the extracted source directory)
./configure (this builds the Makefile)
make (make turns the source into a compiled binary)
sudo make install (this places the program onto your userland filesystem, using root privileges.)
Google shell application is *really cool*
by Brian on Jun.04, 2008, under General Info
There’s a new way to search Google’s massive indexes. It’s called the Google Shell. You can find it at http://goosh.org Try it right now.. It’s basically a very UNIX-like way to search Google. You can use UNIX-ish commands to search. Try it!
My list of banned mail servers
by Brian on Sep.16, 2007, under General Info
Just in case anyone cares, here’s the list of servers I refuse to accept mail from. This is a very large list, (over 22,500 hosts and networks) and is fairly restrictive. It covers all IP address space in China, Korea, most of Holland, and many others that have spammed my servers.
If you find yourself listed here, don’t email me. I don’t care. It’s my mailserver, and I’ll accept mail from whomever I please. Â :PÂ Â
P.S. If you are listed here by individual IP address, you suck. Stop spamming people. Loser.
Anyway, here’s the list:
https://cryptednets.org/bannedmailservers.csv
If you use OpenBSD’s PF, and want to use it in a table, copy the list to “/etc/bannedmail” and then you can add the list like so:
# pfctl -t <bannedmail> -T add `cat /etc/bannedmail`
then, just disallow these IP’s from connecting to your mail server:
First, add the table to the pf.conf:
table <bannedmail> persist file "/etc/bannedmail"
and
block drop in quick on $ext_if from <bannedmail> to any
or
rdr on $ext_if proto tcp from !<bannedmail> to $ext_if port 25Â -> $mailserver port 25
Just in case you've forgotten…
by Brian on May.31, 2007, under General Info
The 10 Immutable Laws of Computer Security
- If a bad guy can persuade you to run his program on your computer, it’s not your computer any more.
- If a bad guy can alter the operating system on your computer, it’s not your computer any more.
- If a bad guy has unrestricted physical access to your computer, it’s not your computer any more.
- A computer is only as secure as the administrator is trustworthy.
- Weak passwords trump strong security.
- Encrypted data is only as secure as the decryption key.
- An out of date virus scanner is only marginally better than no virus scanner at all.
- If you allow a bad guy to upload programs to your website, it’s not your website any more.
- Absolute anonymity isn’t practical, in real life or on the Web.
- Technology is not a panacea.
Your cell phone does more than you think…
by Brian on Sep.16, 2006, under General Info
Your mobile phone can actually be a life saver or an emergency tool for
survival. Check out the things that you can do with it:
1.) Have an emergency?
The Emergency Number worldwide for **Mobile** is 112 . If you find
yourself out of coverage area of your mobile network and there is an
emergency, dial 112 and the mobile will search any existing network to
establish the emergency number for you, and interestingly this number 112
can be dialed even if the keypad is locked. **Try it out.**
2.) Have you locked your keys in the car?
Does your car have remote keys? This may come in handy someday.
Good reason to own a cell phone:
If you lock your keys in the car and the spare keys are at home, call
someone at home on their cell phone from your cell phone.
Hold your cell phone about a foot from your car door and have the person
at your home press the unlock button, holding it near the mobile phone on
their end. Your car will unlock.
Saves someone from having to drive your keys to you. Distance is no object.
You could be hundreds of miles away, and if you can reach someone who has
the other “remote” for your car, you can unlock the doors (or the trunk).
3.) Hidden Battery power
Imagine your cell battery is very low , you are expecting an important call
and you don’t have a charger. Nokia phones come with a reserve battery.
To activate, press the keys *3370# Your cell will restart with this reserve
and the instrument will show a 50% increase in battery. This reserve will
get charged when you charge your cell next time.
4.) How do I disable a STOLEN mobile phone?
To check your Mobile phone’s serial number, key in the following digits on
your phone:
* # 0 6 #
A 15 digit code will appear on the screen. This number is unique to your
handset. Write it down and keep it somewhere safe. when your phone get
stolen, you can phone your service provider and give them this code. They
will then be able to block your handset so even if the thief changes the SIM
card, your phone will be totally useless.
You probably won’t get your phone back, but at least you know that whoever
stole it can’t use/sell it either.
If everybody does this, there would be no point in people stealing mobile
phones.