Licensing
Categories
Tags
- A10-6800K
- AIX
- AMD
- AMD-Vi
- Benchmark
- Bible
- BIOS
- capitalism
- Catalyst/FGLRX/Crimson
- CentOS
- communism
- Confucius
- dd-wrt
- DirectX 11
- Fedora
- FedUp
- firmware
- FreeBSD
- GA-F2A88XM-D3H
- Gaming
- Gigabyte
- GNOME
- GNU/Linux
- GRUB
- Hardware
- httpd
- Hyper-V
- IOMMU
- iptables
- Islam
- Jails
- Jesus
- KDE
- KDM
- kernel
- Koran
- kvm
- Leftism
- LFCE
- LFCS
- Liberalism
- libvirtd
- LVM
- MAME
- Microsoft/Windows
- mod_wsgi
- NFS
- NVidia
- OpenSSH
- OpenSSL
- OpenSUSE
- OpenZFS
- overclock
- Paleolithic
- patch
- PlayOnLinux
- Pluto
- postgresql
- qemu
- R
- Red Hat Enterprise Linux
- rpm
- security
- SELinux
- SSH
- Steam
- storage
- systemd
- Torah
- Ubuntu
- UNIX
- upstart
- VT-d
- wine
- yum
-
Recent Posts
Recent Comments
Archives
- September 2021
- January 2020
- December 2019
- September 2019
- May 2019
- April 2019
- March 2019
- July 2018
- February 2018
- January 2018
- March 2017
- February 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
Tag Archives: security
Adding the Brain as Digital Attack Surface
This is approximately the worst idea ever. Yeah, yeah, everyone knew it was going to happen. Everyone knows that someone, somewhere is going to push the cyborg thing, but you’ll find me forever au naturale. I won’t even buy a … Continue reading
Troubleshooting DLNA Discovery: Plex Media Server on a KVM/QEMU Emulated Fedora 22 Server
TL;DR: If you’re running a Plex Media Server in a guest domain on a KVM/QEMU/libvirt-based hypervisor platform, make sure that the bridge you use to provide network access to the guest domain (such as macvtap) is configured in the host … Continue reading
Posted in Information Technology
Tagged CentOS, DLNA, Fedora, GNU/Linux, kvm, libvirtd, Plex Media Server, qemu, Red Hat Enterprise Linux, security, storage
2 Comments
Text-Only Web Browsing
In case anyone wanted a recommendation for a browser, mine is the classic GNU software: Lynx. You can install it in Fedora 22 (or CentOS/RHEL) by merely commanding: dnf install lynx And you can access it straight from the command … Continue reading
John McAfee: Exemplar of the Stereotypical Angry IT Nerd
Man, McAfee sure comes across as a pompous ass in this article, no? Maybe he wrote it when he was having a particularly bad day…or something, but clearly, the purpose of his article was to inform others of how awesome … Continue reading
Unreasonably Bad Design: Computerized Vehicles Edition
The Disaster I know I’m not the only systems engineer out there who has been disturbed by the obviously idiotic designs going into our planes, trains (probably), and automobiles (Update: Corvette, too is designing their vehicles with similar flaws). Here’s … Continue reading
The NSA is a Disaster
I don’t have too much to add to this subject, but I feel obligated to say something. The story to which I will link is old news, but it’s just part of the constant flow of revelations about the extent … Continue reading
The System Defense Stack
Rationale I have scoured the Internet far and wide and found nothing similar to what is in my head regarding this topic, so I thought I’d provide the above as my conceptual map for system defense (not incident detection and … Continue reading
CVE-2015-0235: “GHOST” Vulnerability Analysis
Attack Vectors If I’m reading this report correctly, the only viable attack vector against an otherwise uncompromised system is through software which grants access to some means by which an attacker can supply a string and cause the software to … Continue reading
Oh Yeah, It Might Not Have Been North Korea
See, I usually avoid discussing purely theoretical IT issues on this blog. It’s more important to me that I stick to practical matters which actually help people out. The Internet is full of theoretical discourse (to give it a very … Continue reading
The Proportionate Response to North Korea
You know, I thought about this for a while, and then the most obvious, most awesome answer hit me clearly. I have a feeling our proportionate response should include a lot less data exfiltration and a lot more data infiltration. … Continue reading