Monthly Archives: April 2014

Accessing and Using Virt-Manager Without Root Credentials

This seems to be a common question on the Internet, so I thought I’d cross-post my solution in the ask.fedoraproject.org forum: With Fedora 20, virt-manager implements PolicyKit (I recommend reading the man page). If you want to allow a certain … Continue reading

Posted in Information Technology | Tagged , , , , , | Leave a comment

Installing the Proprietary AMD Catalyst 14.4 Release Candidate Driver (with Benchmarks!)

The installation procedure is the same as previous iterations.  See my notes on the 14.3 version if you’d like to see change observations there, or see the post on installing the 14.2 version for full instructions. Some people are apparently … Continue reading

Posted in Information Technology | Tagged , , , , , | Leave a comment

Firewalling AIX

Because this seems to be a common question on the Internet, I thought I might answer it based on recent experience:  AIX does not support iptables. Built into AIX is IPsec support.  Part of the IPsec support packages is a … Continue reading

Posted in Information Technology | Tagged , , | Leave a comment

Logging Packet Drops in Firewalld

Up-Front Answer Summary: The short answer is:  the feature to simply log all packet actions isn’t available yet.  See the link referenced below in the whole thing. The longer answer is:  There may be a feasible work-around: Your firewalld default … Continue reading

Posted in Information Technology | Tagged , , , , | 11 Comments

Submitting a Bug Report to Gigabyte: Part 2

As you may recall from part 1 with more information on the problem here, I submitted a bug report to Gigabyte regarding their GA-F2A88XM-D3H motherboard’s apparent flaw regarding AMD-Vi (which I planned on using to pass my graphics adapter to … Continue reading

Posted in Information Technology | Tagged , , , | 1 Comment

Heartbleed and System Defense

It crosses my mind that this is a perfect opportunity to discuss system defense options against unknown threats such as Heartbleed (over the past two years, anyway).  How does one defend against a threat which “leaves no trace” and is … Continue reading

Posted in Information Technology | Tagged , | Leave a comment

Heartbleed and Cloudflare: Part 2

Damn, that didn’t take long.  A server reboot might have contributed, but it looks like the private key got ganked pretty fast.  What would be really nice (as I’ve suggested on the CloudFlare blog) would be if someone (them) could author … Continue reading

Posted in Information Technology | Tagged , | Leave a comment

Heartbleed and Cloudflare

http://www.zdnet.com/private-keys-may-be-inaccessible-to-heartbleed-7000028356/#ftag=RSS4d2198e 1)  CloudFlare rocks.  They’re a great organization and they continue to do great things. 2)  I suspected that this would be the case, given the very reasons provided (that certificate data is loaded into memory early on, and therefore … Continue reading

Posted in Information Technology | Tagged , | Leave a comment

[Updated] Heartbleed and the NSA

UPDATE:  Looks like the story may well have been based on bad intel:  http://arstechnica.com/security/2014/04/nsa-used-heartbleed-nearly-from-the-start-report-claims/ There are some shrieky articles out there, so beware, but that one seemed mostly reasonable. Original Article Below: Well, I did call it:  http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html The story … Continue reading

Posted in Information Technology, Politics | Tagged , | Leave a comment

The Glorious rpm –rollback Option

So, at work, someone (me) might’ve decided to go ahead and apply updates to a development system regardless of the vendor’s slowness in coming up with a patch support plan.  This might’ve caused some (quickly remediated) destruction. So I’m here to discuss the … Continue reading

Posted in Information Technology | Tagged , , | 1 Comment