Creating Strong Passwords that are Also Easy to Remember

Monday, February 25th, 2008

Making up passwords is something we have to do almost everyday it seems. Banking web sites, forums, email accounts, webhosting accounts, mail lists, etc. But it seems that making passwords is one of the things that some people have the hardest time doing. Maybe it’s not that it’s hard to make a password, but hard [...]

iScsi and AoE with linux

Sunday, January 21st, 2007

A few days ago I had reason to investigate iscsi and AoE (ata over ethernet). Both are protocols for sharing a physical drive over the network at the block level. Let me put it in context first. Traditional network file shares have been done like this…. Computer A has a large drive, it’s formatted and [...]

Linux Permissions Headache

Wednesday, October 18th, 2006

Yikes, what an evening….. it started innocently enough in the afternoon. I have an old Mandrake 10.0 server that I was upgrading clamav on (recent security update). While I was at it, I was reviewing the anti-spam setup to see if I could get any better success with filtering junk mail. spamassassin has had an [...]

Massive Dell Laptop Battery recall

Monday, August 14th, 2006

This is worth reading if you’ve got a Dell laptop. There have been numerous stories in recent months of Dell laptops exploding into flames and it looks as though now over 4 million batteries from their inspiron, Latitude and Precision laptops are being recalled. The manufacture dates range from April 2004 to July 18, 2006. [...]

Reinventing the capacitor

Friday, June 9th, 2006

These days, big inventions aren’t entirely new creations, but improvements on an old idea. This latest in a string of interesting science/technology breakthrough stories is about just that. Researchers at MIT (how many sentences have I started like that this week?) have developed a new way of constructing a capacitor. One of the limiting factors [...]

Preparing for disaster recovery – system change log

Tuesday, January 17th, 2006

There are a lot of elements to a good disaster recovery strategy…. knowing where offsite backups are located, keeping the offsite backups fresh. Knowing where any ON-site backups are. Having a plan for quick access to replacement hardware. One that probably is easily overlooked is very low-tech. That’s a system log. I don’t know that [...]

How effective is the MediaMax copy protection?

Wednesday, November 23rd, 2005

One of the sub-stories in all the Sony DRM mess of the last month with the XCP copy protection was that it was really an ineffective way of preventing copying of music anyway. In other words, you could press shift while inserting the cd to avoid the installer, then other programs could access the cd/allow [...]


Switch to our mobile site