Monthly Archives: February 2015

Hooray! Internet Service is a Public Utility (or: Why the Unregulated Free Market Just Doesn’t Cut It)

Awesome.  I try to keep this blog more practical than theoretical, and throwing more echoes into the chamber is probably pointless, but thank you, FCC, for doing the right thing. It has been a good day for the American government. … Continue reading

Posted in Information Technology, Politics | Leave a comment

LFCE Preparation Guide: Network Filesystems and File Services – Create, mount, and unmount standard Linux filesystems

Introduction A serious candidate for the LFCE exam is likely to be comfortable with this competency.  Managing file systems is central to the work of system administration, and it should be well-worn ground.  Of course, like any frequently walked path, … Continue reading

Posted in Academics, Information Technology | Tagged , | Leave a comment

Hermeneutics and The Infidel State

Update:  Being that my position as put forth below is but that of a lay scholar, I’d like to direct readers to the excellently written and technically superior Open Letter to Al-Baghdadi, composed by a group of Muslim scholars.  It … Continue reading

Posted in Religious Studies | Tagged , , , , | 8 Comments

System Defense Analysis: The Equation Group

Kaspersky’s Global Research and Analysis Team (GReAT) has posted a 44-page Q&A-style write-up regarding their research into the incredibly advanced malware designed, developed, and implemented by a group they have dubbed “The Equation Group.”  While they don’t name the NSA … Continue reading

Posted in Information Technology | Tagged , , , , , | Leave a comment

LFCE Preparation Guide: Network Filesystems and File Services – Configuring systems to mount standard, encrypted, and network filesystems on demand

Introduction Obviously, the handling of file systems is integral to the job of any system administrator or engineer.  Without file systems, operating systems are not of much use, after all.  The key to distinguishing this competency from the subsequent “Create, … Continue reading

Posted in Academics, Information Technology | Tagged , , , | Leave a comment

The Noble Solution to the Theft of Capitalism

One of the greatest and most frequently overlooked (or perhaps eclipsed, given the more direct and inhumane atrocities) evils committed by the likes of the despicable totalitarian governments of China and the USSR was the defamation of communism.  When Karl … Continue reading

Posted in Politics | Tagged , | Leave a comment

LFCE Preparation Guide: Network Administration – Troubleshoot Network Issues

Introduction Well, if you’ve gone through all the previous competencies in order to get here, you’re probably feeling pretty good about this one!  I would think that most system engineers ready for this exam are comfortable with this area.  I’m … Continue reading

Posted in Academics, Information Technology | Tagged , , | Leave a comment

Striped Logical Volume Design and Construction: Block Stacking for Fun and Profit

For those of you well versed in UNIX-like systems, you know the logical volume manager is a big deal.  Coming from a Windows world, it is something of a very deep and powerful virtual disk service.  It’s kind of a … Continue reading

Posted in Information Technology | Tagged , , , | Leave a comment