Loading...

Archive for February, 2015

High-Availability Storage with HA-LVM

In recent years, there has been a trend in which data centers have been
opting for commodity hardware and software over proprietary solutions. Why
shouldn’t they? It offers extremely low costs and the flexibility to
build an ecosystem the way it is preferred. The only limitation is the extent
of the administrator’s imagination. more>>

Share

DNSMasq, the Pint-Sized Super Dæmon!

I’ve always been a fan of putting aftermarket firmware on consumer-grade
routers. Whether it’s DD-WRT, Tomato, OpenWRT or whatever your favorite
flavor of “better than stock” firmware might be, it just makes economic
sense. Unfortunately, my routing needs have surpassed my trusty Linksys
router. more>>

Share

Localhost DNS Cache

Is it weird to say that DNS is my favorite protocol? Because DNS
is my
favorite protocol. There’s something about the simplicity of UDP packets
combined with the power of a service that the entire Internet relies on
that grabs my interest. Through the years, I’ve been impressed with just how
few resources you need to run a modest DNS infrastructure for an internal
network. more>>

Share

Microsoft Frees CoreCLR

.NET Core execution engine is the basis for cross-platform .NET implementations.

Share

New Trojan Attacks Linux Servers

The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.

Share

Real-Time Rogue Wireless Access Point Detection with the Raspberry Pi

Years ago, I worked for an automotive IT provider, and occasionally we went
out to the plants to search for rogue Wireless Access Points (WAPs). A
rogue WAP is one that the company hasn’t approved to be there. So if
someone were to go and buy a wireless router, and plug it in to the
network, that would be a rogue WAP. more>>

Share