Monthly Archives: January 2015

The System Defense Stack

Rationale I have scoured the Internet far and wide and found nothing similar to what is in my head regarding this topic, so I thought I’d provide the above as my conceptual map for system defense (not incident detection and … Continue reading

Posted in Information Technology | Tagged | Leave a comment

CVE-2015-0235: “GHOST” Vulnerability Analysis

Attack Vectors If I’m reading this report correctly, the only viable attack vector against an otherwise uncompromised system is through software which grants access to some means by which an attacker can supply a string and cause the software to … Continue reading

Posted in Information Technology | Tagged , | Leave a comment

LFCE Preparation Guide: Network Administration – Routing IP Traffic Statically and Dynamically

Introduction This is another very robust, non-trivial competency listed for the LFCE examination.  I’m glad it’s included, actually, because networking is a very poorly-understood field among many IT professionals serving as system administrators or, worse, system engineers and beyond.  I … Continue reading

Posted in Academics, Information Technology | Tagged , , | 7 Comments

LFCE Preparation Guide: Network Administration – Producing and delivering reports on system use, outages, and user requests

Introduction Again, the scope of this competency has been difficult for me to determine.  The only other seemingly-reputable LFCE guide on the Internet (TecMint) hasn’t yet published its post on this subject, and as with the previous post (Monitoring Network … Continue reading

Posted in Academics, Information Technology | Tagged , , , , , | 1 Comment

LFCE Preparation Guide: Network Administration – Monitoring Network Performance

Introduction The scope of this competency has been difficult for me to determine.  The only other seemingly-reputable LFCE guide on the Internet (TecMint) hasn’t yet published its post on this subject, and I’m very interested to see how they handle … Continue reading

Posted in Academics, Information Technology | Tagged , , , , , , | Leave a comment

LFCE Preparation Guide: Network Administration – Implementing Packet Filtering

Introduction By “packet filtering,” the Linux Foundation here appears to be referring to iptables in the CentOS environment.  While iptables is still usable on RHEL/CentOS 7, it is by default replaced by firewalld (part of the systemd software suite), which … Continue reading

Posted in Academics, Information Technology | Tagged , , , , | Leave a comment

Multiseat Configuration in Fedora 21

This is really cool, so I thought I’d share.  I came across a query regarding the possibility of setting up multiple simultaneous users with their own keyboards, mice, and monitors (and whatever else) on the same system.  It seems like … Continue reading

Posted in Information Technology | Tagged , | 12 Comments

LFCE Preparation Guide: Network Administration – Configure network services to start automatically at boot

Introduction This competency is so rudimentary and narrow in scope that it seems almost out of place on the domains and competencies chart when compared with others such as installing and configuring an Apache web server, but it’s certainly fundamental … Continue reading

Posted in Academics, Information Technology | Tagged , , , , , , | Leave a comment

The (Very Unofficial) Linux Foundation Certified Engineer Examination Preparation Guide

IMPORTANT:  What to Expect of this Guide This really belongs past the below introduction, but I want everyone to see it clearly.  This guide probably won’t be like most other guides out there, but that’s because I don’t think the … Continue reading

Posted in Academics, Information Technology | Tagged , , , , , | 12 Comments

The Fetishization of the Koran

Before I read the Koran, I was a Muslim.  All my life, I have wanted communion with God, and I have felt that worship is nothing less than full devotion to the way of righteousness.  It is in aiding the … Continue reading

Posted in Religious Studies | Tagged , , , | Leave a comment