Here is the process for modifying libvirt-compatible disk images for use in OpenStack. These images are used to boot virtual machines, or in the case of TripleO the images are used to build OpenStack nodes. When I searched for information on libguestfs for Red Hat Enterprise Linux I found a lot of obsolete information. For… Read More
Recent developments in the world of malicious hacking show that combining multiple technologies can lead to big things. The latest craze in combining crowdsourcing with organized cracking has brought the general public in on the effort, rather than making them passive observers. The attacks from the malicious hacking group Anonymous have grown in both the… Read More
Packetlife.net has a very nice collection of “cheat sheets” for network engineering. These are great references for things that always seem hard to remember when you need them most, like “How do I filter out the CEO’s porn browsing from the packet trace on the Internet router that I am sending to a technical support… Read More
“If you have knowledge, let others light their candles in it.” -Margaret Fuller A touching reminder that when knowledge is shared nothing is lost, and everyone gains.
The Internet Systems Consortium (ISC) which manages the Domain Name System (DNS) software that practically everyone uses announced today that practically everyone’s software is vulnerable to a denial-of-service attack. This means that you can expect major interruptions to Internet services for weeks (or months) to come. DNS is the system by which the name of… Read More