On 2016-08-27 14:22, Matt Lawrence wrote:
> I agree wholeheartedly with the theory, but these systems are scheduled to be
> scrapped in the next 6-12 months. This is in addition to the fact that the
> people who knew how these systems were built are no longer there. Everything
> is being migrate
One site I worked at used a software, I cannot remember which one, but I'm
surprised I only saw one mention of sssd and none of freeIPA. FreeIPA wants to
replace AD, but I believe there is a way to configure it to make it have a
"trust relationship" with AD, which might work for this (WARNING: I h
On 2016-07-06 10:17, Ted Cabeen wrote:
> You've gotten lots of good answers. The only other one I'd want to mention is
> that you can also host your personal email out of your home server and use an
> AWS t2.nano instance to proxy the email in and out. That eliminates storage
> charges for those o
I need to compile a small piece of C for Solaris 10 on sparc.
I'm looking at cross-compiling from my Ubuntu box, but not getting anywhere
right now.
So, I'm wondering, are there servers freely accessible somewhere for this type
of things (easily accessible, that I don't have to spend 2hours sig
On 2016-06-16 13:07, Ray Van Dolson wrote:
> Can anyone recommend a company in the Ottawa area who will securely
> dispose of hardware (servers mainly). I'd want some sort of
> certificate of destruction back from them around the hard drives and
> would like them to be able to handle unracking and
On 2016-05-13 06:30, Mark Lamourine wrote:
> I use Bash, but I have come to do something I don't see elsewhere much.
>
> I make a lot of use of functions and local variables. Basically any time I
> see a coherent string of commands whether it's a pipe or a set of logical
> checks, I name the oper
On 2016-05-12 17:08, Morgan Blackthorne wrote:
> Maybe. Right now bash under Windows can only do stuff inside Linux (outside of
> the filesystems which are mounted). You still can't launch Windows
> commands/applications from bash, which is pretty limiting. Most anything folks
> do currently in Pow
A lot of people love to hate bash, and there are good reasons for it, but it
seems that there isn't an obvious replacement for it.
At some point it looked like perl was going to be it, then depending on the
local preferences some shops use either python or ruby, heavy JVM shop often
use groovy, w
On 2016-04-15 13:52, Jack Coats wrote:
> I use it at home. It cuts down the amount of outside attacks I see on my
> router.
>
> I have two outside feeds, and they are willing to allow two IP addresses to be
> protected for one home connection. You just have to communicate directly and
> let th
On 2016-03-31 09:15, Guus Snijders wrote:
> The first thing that comes to mind is grep, with -A and -B (after/before)
> parameters. Not sure how it will perform with such big datasets, but it's
> probably a lot quicker than vi ;).
If you are going to use grep, I strongly suggest that you take a lo
On 2015-11-13 12:23, Peter Loron wrote:
> The Librem laptops from Purism are very nice, although they fail the
> cheap criteria.
>
> https://puri.sm/
They look good, I like the idea behind it, but some of us have to have a
trackpoint!
--
http://yves.zioup.com
gpg: 4096R/32B0F416
__
On 2015-11-12 05:19, Edward Ned Harvey (lopser) wrote:
>
> I know there's a very good chance that any random linux will work fine on any
> random laptop I buy, but I certainly prefer to have some greater assurance -
> ideally it's an officially supported distro, or maybe there's some unofficial
>
On 2015-11-07 08:31, Dan Ritter wrote:
>
> Let me suggest that editing files in place is a really finicky
> operation, and it would be better to do something like:
Ansible modules typically have an option to make backups of the file they
modify.
> Even better is to not be in this situation in
On 2015-10-29 12:54, Ryan DeShone wrote:
> I agree... but back to the original topic. If you just want a log of
> everything you do, I use the following hack to keep an eternal log of
> commands run in bash.
>
> https://gist.github.com/ardichoke/038c84b7966856da211a
>
> Used it in the past when
On 2015-10-29 09:03, Matt Simmons wrote:
>
> I have at least one tmux window running, with several panes. In the example
> screenshot, I have vi running on the left side, on the right side top, I'm
> editing a puppet file, and on the bottom right, I'm running commands relevant
> to the two editing
For people spending a lot of time in a terminal/shell (bash, csh etc...) do
you work from the shell or from an editor?
The joke goes that people using emacs live inside emacs, and I have indeed
seen developers working from a simple window and sending chunk of code to a
compiler/repl right from em
I posted the link to hacker news, if you want to participate in that discussion:
https://news.ycombinator.com/item?id=10339175
On 2015-10-06 08:37, Yves Dorfsman wrote:
> On 2015-10-06 08:11, Josh Smift wrote:
>>
>> (So maybe what you mean here is "there's z
On 2015-10-06 08:11, Josh Smift wrote:
>
> (So maybe what you mean here is "there's zero upside to asking your
> customers to send reusable credentials", because what you want is to
> encourage us IT professionals to change how our servers work. But your
> rhetoric here keeps making it sound like
I'd like to hear from people who worked in environments requiring "separation
of duty" (SOX, PCI) and how they have dealt with:
- continuous delivery: how do you automate deploys if a "trusted human who
is not a dev" has to sign off each deploy?
- mixed team and separation of duty: especiall
On 2015-09-11 05:51, Edward Ned Harvey (lopser) wrote:
> She's using yahoo, I'm using office365. So there's effectively zero percent
> chance of fixing it, because neither organization is going to change
> anything. I can at least reach office365 support - and they're generally very
> helpful -
On 2015-09-10 05:43, Edward Ned Harvey (lopser) wrote:
> I cannot believe my eyes, and I'm not finding anybody complaining about this
> on the internet, so can somebody please confirm you see the same behavior?
>
>
>
> When you send email from yahoo, and the recipient doesn't exist (email
> bou
For the past 25 years or so, I've always used:
cat /dev/null >/path/to/filename
to empty a file. Somebody just showed me:
>/path/to/filename
Is this "new"? I've never seen it before (and I've worked with quite a few
sysadmins and devs)... Is this bash vs other shells? I feel weird no
On 2015-02-20 11:16, john boris wrote:
>
> If the Lightsout port is given the 172.10.5.30 IP with a netmask of
> 255.255.248.0 and a route to 172.10.10.1 would that allow someone coming in
> from the central site to see it?
>
> We are experimenting with this and can talk off line if need be. Als
On 2015-01-22 19:28, Josh Smift wrote:
>
> Speaking of this, I recently ran into trouble because I'd set my outgoing
> SMTP server on my mail client on my Android phone (K-9 Mail) to be the
> mail server I generally use for personal mail, with Postfix doing
> authenticted TLS and all; and I found
Somehow related to the thread on programming languages, if you tweet the list
of languages you used in 2014 to #code2014, you'll be changing the shape of
http://www.code2014.com/
--
http://yves.zioup.com
gpg: 4096R/32B0F416
___
Tech mailing list
Tech@
Apps need to access database and other object stores, get access to other
servers via keys, use encrypted ssl certs etc...
The two strategies to deal with that I usually see are
- variations on a config file (text) and trusting the OS permissions
- manually entering a master password to an
On 2014-12-10 14:41, Matthew Barr wrote:
> You can do it with VPC peering. Default VPC is a convince, but not
> hard to replicate. The new one won't be the default, but it'll be ok.
>
> Or, you could use subnets inside 172.31, within issue, I believe.
> Haven't tried that, but peering was easy
We want to route from one AWS account to another hopefully without using NAT.
Is it possible to make a new VPC (with a different CIDR block than the default
172.31/16) the default VPC for a given account?
Thanks.
--
http://yves.zioup.com
gpg: 4096R/32B0F416
__
On 2014-11-28 07:17, Edward Ned Harvey (lopser) wrote:
>
> In ansible, there is no dedicated control host. You just install ansible on
> any machine, and you somehow get your ansible directory structure and files
> onto it (via git or whatever). End of story. Actually I guess the story is
>
On 2014-11-18 22:42, Tracy Reed wrote:
>
>> It's also much faster than bash.
>
> I can't think of a single time in over 20 years of using bash that the
> execution speed of bash code has made the slightest difference.
I hadn't realised that ksh was faster, but even with ksh (ksh 93 any way),
I/O
On 2014-11-18 19:50, Mark McCullough wrote:
>
> That said, ksh has some pretty slick object oriented functionality and can
> pass objects around easily enough if you prefer. It's also much faster than
> bash.
> --
Sadly, the licenses used for ksh by AT&T back a few years ago made bash more
pre
On 2014-11-18 11:54, Paul Heinlein wrote:
> On Tue, 18 Nov 2014, Yves Dorfsman wrote:
>
>> On 2014-11-18 08:01, Ari Constancio wrote:
>>> On Tue, Nov 18, 2014 at 2:12 PM, Adam Moskowitz >> du -ks * | sort -n | head -10
>>>
>>> $ du -
On 2014-11-18 08:01, Ari Constancio wrote:
> On Tue, Nov 18, 2014 at 2:12 PM, Adam Moskowitz du -ks * | sort -n | head -10
>
> $ du -sm *|sort -nr|head -n10
If your systems support it (GNU coreutils does), have a look at the
human-readable option (-h):
du -sh /blah |sort -h
--
Yve
On 2014-11-13 14:14, Josh Smift wrote:
> AP> You run Ansible manually, I haven't talked to anybody who runs Ansible
> AP> on an automatic schedule like Puppet and Chef are typically used.
>
> My sense is that the Ansible people think that would be a somewhat odd way
> to use it. If you didn't make
On 2014-11-13 09:20, Brad Bendily wrote:
> Ansible users. How does every handle the SSH and root access parts?
> I assume you don't have ansible connecting directly as root on the
> destination servers, you use a regular user.
> Then how do you give that user sudo/root access and provide that user
On 2014-11-12 15:39, Edward Ned Harvey (lopser) wrote:
>> From: Christopher Webber [mailto:cweb...@cwebber.info]
>>
>> Full disclosure: I work for Chef now
>
> Ok, question for you. ;-) The first thing that tipped me toward puppet
> instead of chef was the lack of push. Has that changed? Ac
On 2014-11-12 17:34, Edward Ned Harvey (lopser) wrote:
> How many nearly-identical systems does it take to be worthwhile?
>
1) it's not a number game
2) as you pointed out yourself, your systems have a lot more commonalities
than you'd think.
Even for one single system, the fact that you can l
On 2014-10-11 07:29, Edward Ned Harvey (lopser) wrote:
>
> For the time being, I'm strongly in favor of Digital Ocean. The one server I
> was able to easily migrate away from AWS to DO, is all-SSD, and depending on
> what you measure, performs between 4x and 1000x faster in every way, and
> co
On 2014-10-11 06:51, Edward Ned Harvey (lopser) wrote:
> Like I said about it not being easy to uproot your server and *either*
> upgrade to bigger hardware on their service, or migrating all your services
> to another provider.
Three things:
1) If you been using a t1.small "for years", you've
On 2014-10-10 07:51, Page, Jeremy wrote:
> On 10/10/2014 08:50 AM, Brandon Allbery wrote:
>> On Fri, Oct 10, 2014 at 6:33 AM, Edward Ned Harvey (lopser)
>> mailto:lop...@nedharvey.com>> wrote:
>>
>> taking 10 minutes to start apache
>>
>>
>> Why are you running Apache on a micro instance? That
On 2014-10-09 04:35, Edward Ned Harvey (lopser) wrote:
>> From: tech-boun...@lists.lopsa.org [mailto:tech-boun...@lists.lopsa.org]
>> On Behalf Of Yves Dorfsman
>>
>> There are a lot of things on AWS that aren't clear, but this isn't one of
>> them. The
On 2014-10-08 19:38, Edward Ned Harvey (lopser) wrote:
>
> After speaking to a whole bunch of people about a whole bunch of systems, I'm
> pretty confident that we know what's going on - Simply, the machine in
> question is a "tiny" instance, so when Amazon gets enough demand for higher
> payin
obviously receive the key
and keeps going.
On 2014-10-06 11:56, Steve VanDevender wrote:
> Yves Dorfsman writes:
> > Yes, DEBUG3.
> >
> > The trace from a working client and a non-working client are identical,
> except
> > that the non-working one stops when it g
et a new IP if you can keep the
> IP, but move the instance somewhere and the problem goes away that would be
> quite telling.
>
> On Mon, Oct 6, 2014 at 11:41 AM, Yves Dorfsman <mailto:y...@zioup.com>> wrote:
>
>
> We've run into this weird AWS issue 3 ti
this happens.
> At a guess, it sounds almost like sshd is hanging. Otherwise it should close
> out on its own after about 30-90 seconds from a TCP timeout.
> -D
>
> On Mon, Oct 6, 2014 at 12:41 PM, Yves Dorfsman <mailto:y...@zioup.com>> wrote:
>
>
> We
We've run into this weird AWS issue 3 times now in a week, never seen it before:
A Linux instance becomes unreachable via ssh from some ip addresses. If you
try to ssh from those addresses, it just hangs, for ever, until to ctrl-c out
of it. Yet you can ssh from other ip addresses without any pro
On 2014-09-28 08:54, Edward Ned Harvey (lopser) wrote:
>
> And "Customers who aren’t sure if they are impacted should go to the “Events“
> page on the EC2 console, which will list any pending instance reboots for
> their AWS account."
Also you can set "alternate contact" in your "account settin
On 2014-09-28 09:00, Edward Ned Harvey (lopser) wrote:
>> From: Derek Balling [mailto:dr...@megacity.org]
>> Sent: Sunday, September 28, 2014 10:46 AM
>>
>> Wild-ass Speculation: With Amazon's commitment to cloud computing, and
>> with SDN use on the rise... is it possible they're rebooting "virtua
On 2014-09-26 15:53, Brandon Allbery wrote:
> On Fri, Sep 26, 2014 at 5:45 PM, Yves Dorfsman <mailto:y...@zioup.com>> wrote:
>
> But this is my concern...
> Business (notn-technical) users using their laptop on a public wifi such
> as an
> overpriced c
On 2014-09-26 15:19, Brandon Allbery wrote:
>
> ...or has the minimal wherewithal to run a rogue DHCP server on a random
> Windows box, which doesn't have the concept of privileged ports, or on a
> personal Linux laptop where they have root so the point is moot. How many
> places will allow random
On 2014-09-26 13:04, Brandon Allbery wrote:
>
> There are more DHCP clients than just ISC dhclient. OS X uses something
> completely different, as far as I can tell; most likely it's based around
> launchd and uses Mach ports and other OS X-specific IPC instead of relying on
> the environment, and
What do you guys do for your OS X non-techincal users?
Give them instructions on how to update bash manually?
Give them instructions on how to close port 22 and 80 when using public wifi?
Anybody has any idea when Apple might release a proper patch?
--
Yves.
___
On 2014-09-10 22:26, David Lang wrote:
> How many different logs are you talking about?
It depends on the server, apps server can have a dozen logs + the regular
system logs.
> Do you have another method of getting the logs other than scraping the files?
No, I thought graylog2 would come with it
Anybody uses graylog2?
Is there a simple "forwarder" that can be configured to send a list of files
or directory to graylog2?
All the solutions I am finding are specific to apps (using log4j etc...) or
very amateurish, such as "tail -f blah | netcat -" without consideration
for when files ar
Anybody faced with managing the users across multiple AWS accounts?
What do you use? Third party product? Can it be done with the Cross-Account
API (it seems to be very limited at first read)? Other solutions?
Thanks.
--
Yves.
___
Tech mailing list
The last time I looked at this (a six or eight months ago), KeePass / KeePassX
was the only password manager that supported all the platforms I needed
(Linux, Windows, Mac, Android).
Using it with Dropbox or an equivalent means you can keep all your password in
sync accross all devices.
On 2014-
Does anybody know what's going on (codespaces.com, bonzai.io)?
Is it a series of people making obvious mistake (easily guesses password, keys
spread to public places, etc...)?
Or some new type of attack not so obvious, and that more sites thinking they
are secure might be exposed to?
--
Y
With clouds (private and public) where you spin up new VMs or containers for
every deploy, how do you guys deal with:
Login in:
- Can you ssh to all your servers/containers? Or just check centralised logs?
- If you can't ssh to them, how do you solve hard problems, problems where
you'd
On 2014-05-14 22:37, Mathew Snyder wrote:
I'm looking for an application that will allow me to track some projects that
I work on individually. If it has collaboration functionality that is fine,
but I need something that doesn't require it. Additionally, I don't want it to
be something to work a
We're using ansible to configure and deploy software, but we're not happy with
it's EC2 abstraction, we've decided to use something else to do the
provisioning of the VMs, probably scripts with boto, but wondering if there's
a better way...
We're using AWS right now, so we're ok with an AWS
On 2014-04-16 21:14, Matt Okeson-Harlow wrote:
If it is taking a long time to push pubkeys out, is this possibly due to the
number of forks? Before 1.3 I believe the default was 5.
Are keys pushed out as part of a master 'Do all the things' update, or are
they tagged so that something like 'an
On 2014-04-15 20:01, Paul Graydon wrote:
At my last place we had a chef cookbook set up that pulled public keys out of
a chef databag. Every server, virtual or physical, included a core cookbook
that enforced certain standards across the fleet, which in turn ingested the
public key cookbook. W
We've been pushing ssh public keys with Ansible, but this is becoming
cumbersome:
- it takes a significant amount of time to do so, this is growing as the list
of keys is growing (O(n) type of thing)
- keys only get pushed where somebody does a does a push, which means that it
becomes somebod
On 2014-04-12 00:07, David Lang wrote:
It's not a verified account, but:
https://twitter.com/nsa_pao/status/454720059156754434
Statement: NSA was not aware of the recently identified Heartbleed
vulnerability until it was made public.
https://twitter.com/nsa_pao/
Official page of the NSA Pu
So it turns out it is possible. I highly recommend anybody not using it yet to
look into it. Not doing this is the equivalent of having non-password
protected ssh keys floating around... It is actually worse because people are
semi-counscious that ssh private keys need to be secret, and ssh it
On 2014-02-18 15:12, Smith, David wrote:
I think Yves meant, that there's no way to password-protect individual EC2
credentials, not SSH keys.
Correct.
The least-bad thing I've been able to think of, is making sure the credentials
are rotated regularly, and stored in such a way that it's n
On 2014-02-18 11:36, Edward Ned Harvey (lopser) wrote:
The easiest and best thing to do for several reasons, is to make sure all your
laptops run whole disk encryption.
I don't disagree, but I see these two as kind of separate, encrypting the
drive will only close one door. The EC2 keys migh
I'm asking these question on the AWS forum, but now I am wondering what other
people do
We have an EC2 environment, our developers have access to the console and API,
and start and stop instances etc... as part of their work. Most of them work
from their laptop. I am starting to look at
On 2014-02-06 10:14, David N. Blank-Edelman wrote:
It has been a couple of years since I last asked this so I thought I would
check in and see what the current wisdom is on this question.
Where do people think the best place to advertise for sysadmins these days (or
to flip this, where do t
On 2014-02-05 10:09, Phil Pennock wrote:
Well-behaved long-running programs don't hold open unlinked files for
any length of time.
Exactly my point.
Then I ask the filesystem how full it is, with "df", which is a quick
metadata query; I'll probably use "df -hi" to get human-readable figures
There is a new trend that I find slightly alarming: applications deleting
their temp files as soon as they are open. Two of the culprit that came to my
attention recently are GNU coreutils mktemp and MariaDB.
I understand the objective, they want to leave the environment clean even in
the ca
On 2014-01-11 08:30, Tom Limoncelli wrote:
As far as what Andrew Hume pointed out... the unspoken bad news about cloud
computing is that the networking aspects are not very mature and most hosting
systems have unpredictable network quality. I would be interested if you
could run the same test f
On 2013-11-12 15:38, Bill Bogstad wrote:
On Tue, Nov 12, 2013 at 9:22 AM, Yves Dorfsman wrote:
On 2013-11-12 07:00, Edward Ned Harvey (lopser) wrote:
...
Why wouldn't you just create a google account for them, and set their
tablets with it?
Because that would be a violation of Goo
On 2013-11-12 07:00, Edward Ned Harvey (lopser) wrote:
From: tech-boun...@lists.lopsa.org [mailto:tech-boun...@lists.lopsa.org]
On Behalf Of john boris
4. She took to it like a duck to water. But the problem was older kids were
getting on the machine when she wasn't around and causing me grief (
On 2013-11-12 05:24, Adam Tauno Williams wrote:
On Mon, 2013-11-11 at 12:59 -0700, Yves Dorfsman wrote:
On 2013-11-11 10:41, john boris wrote:
I have a question for the list. I am looking for some advice on what type of
machine would be the best purchase for a 1st/2nd grader for use at home
On 2013-11-12 05:26, Adam Tauno Williams wrote:
On Mon, 2013-11-11 at 20:13 +, Will Dennis wrote:
Hey, and they got to learn awk and sed sometime... ;-P
Something like Linux Mint would do nicely, I think.
If GNOME3 / GNOME Shell is there preference than openSUSE is probably a
better choice
On 2013-11-11 10:41, john boris wrote:
I have a question for the list. I am looking for some advice on what type of
machine would be the best purchase for a 1st/2nd grader for use at home. When
It does not matter. Kids just adapt extremely rapidly. I have switched my
kids' laptops from Gnome 2
Could it be that the Windows client use passive ftp by default while the linux
client use active by default (you mention firewalls)? Have you tried to force
passive mode?
When I ran into issues with UNIX to Windows and vice versa FTP, the problem
was that one was expecting status code while
I don't know about those particular technologies, but I'm assuming through
snapshots with equivalent retetions as you'd do for your backups.
___
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provid
On 2013-08-20 11:31, Josh Smift wrote:
jb> I routinely need to convert jpg images to pcx files.
TSOR suggests that Image Magick's 'convert' program can do this. 'sudo
apt-get install imagemagick' for Ubuntu.
And of course GraphicsMagick
http://www.graphicsmagick.org/
Which is the free'er ver
Replying for the next guy who run into this (or me if I forgot about it!).
keywords: mount hanging, nfsv4, kerberised nfs, ubuntu nfs.
The only documentation I could find about the NFSv4 protocol are the RFCs.
There is no step by step sequence diagram, but once you start seeing where it
block
I'm trying to setup kerberised NFSv4 on a pair of VPS', and I am running into
problems. Is there a good doc that details the protocol step by step?
I think I've got kerberos right, but when the client and server start talking
NFS, the server stop answering. Both server and clients are NATed,
On 2013-07-22 14:52, Josh Smift wrote:
I use a couple of external hard drives with whole-disk encryption, but
that's only for local backups. I keep meaning to look into whether I could
create a whole-disk-encrypted filesystem-in-a-file, which I could mount,
back up to, unmount, and then copy off-
On 2013-07-22 15:39, unix_fan wrote:
Private as in
1. Nobody, unless they are verifiably Andrew Hume should get these files
or
2. In the event of my untimely demise, I hope one of my survivors can retrieve
these bits
I use gpg for both, it's not ideal, but works for me for now. I have let the
On 2013-07-22 11:39, Andrew Hume wrote:
occasional usage (maybe once month).
single user.
personal data.
If it's for *you*, gpg + rsync to any always-on, always net-accessible space
works well. Checkout for OpenVZ offers out there, there are hundreds of them
for very cheap. I do this with a
On 2013-05-09 12:14, Michael Ryder wrote:
How about Option 3, setup an interface to automate the update of AD entries
directly from HR's database? Maybe the stuff you left out would short-circuit
this option... maybe not. But it would seem to be the most elegant choice
that could be automated a
Anybody has experience with NFS over the internet?
Encrypted NFS4 vs. non-encrypted NFS through an stunnel vs. non-encrypted NFS
through an ssh tunnel?
How do they compare in term of security and added latency?
Other solutions?
Thanks.
--
Yves.
On 2013-04-21 10:34, Edward Ned Harvey (lopser) wrote:
rdiff-backup is more well suited for the former description you've described,
although it can certainly be used in the latter. Because rdiff-backup
maintains history indefinitely (unless otherwise instructed) you probably don't
want to r
On 2013-04-21 09:57, Brad Beyenhof wrote:
Although I'm surprised it doesn't have any comment capability.
I'm not sure exactly what you mean by this, but I definitely value the
commit-style nature of git as a version-tracking mechanism, where rdiff-backup
(or duplicity) just copies filesystem
On 2013-04-20 22:35, Brian Mathis wrote:
We wound up writing our own tool that creates a copy of every file we want to
watch in a separate location, and keeps that location under revision control.
A script runs every night and emails out the diffs before auto-committing them
to the local repo.
On 2013-04-20 07:45, Ali Sajid Imami wrote:
At $WORK, we tend to use a private git repository, and a custom script. We
clone the directory to anywhere we like, commit our changes, then push it to
github. Then a custom script, pulls all the stuff down and a puppet run puts
the files in their appro
On 2013-02-25 08:19, Andrew Hume wrote:
i am asking this for a friend who needs to remain unidentified.
she needs to get whois type information for approx 1M ip addresses in teh US.
she can, and has, just simply bang out the queries but by observation,
one's ip address will get blacklisted if th
On 2013-02-07 09:36, Tom Limoncelli wrote:
I believe the purpose of cable labels is to accelerate tracing. That
is, when you need to know "where the other end" having labels means
you can read the label instead of physically tracing the cable. If a
cable has the same tag on both ends, if you f
I might be in a situation where I need to install and configure software on
Linux servers without having root access (I'd have my own filesystems, and a
"power user" which owns those filesystems). Yet I need this task to be easily
repeatable (read: as automated as possible).
Is it worth tryi
On 2012-11-16 06:07, Edward Ned Harvey (lopser) wrote:
Thanks for suggestions everyone. This is the best solution because it's
clearly understandable and readable, doesn't have any external dependencies
(like possibly unavailable or varying versions of perl/awk/sed/python)
PERM=`stat -c '%a'
On 2012-11-15 15:45, Edward Ned Harvey (lopser) wrote:
If using "stat" you can also get the perms in 755 format. From here, I can
easily do a bitwise & with 2, and I can easily find the world write bit. But
bash
arithmetic doesn't view the number "755" in octal... It operates decimal. So I
c
On 2012-08-28 15:43, Jack Coats wrote:
to my college's Chemistry Dept, and we fixed the logic by replacing
geranium based transistors that were 2 flip-flops per circuit board
(about 2.5x2.5" each). 48bit words, and most instructions were 'half
Truly, the first organic computer!
Too sad we then
On 2012-08-27 22:31, Skylar Thompson wrote:
Why exactly do you want to waste RAM on dead code/data? It served
its purpose, it should get out of the way and let something
productive use the RAM.
It can be a real problem for latency-sensitive applications that are
cohabiting on a system that's
On 2012-08-27 22:25, Brandon Allbery wrote:
On Tue, Aug 28, 2012 at 12:20 AM, Yves Dorfsman mailto:y...@zioup.com>> wrote:
I for one, totally disagree with your statement, I do not want any of my
process to be pushed to swap to just buy some buffer space. If I have an
I/O
On 2012-08-27 20:41, Edward Ned Harvey (lopser) wrote:
Here is what swap is meant for:
At every opportunity, the kernel will grow the system buffer & cache to consume all physical
memory in the system. It is normal to see near-zero "free" memory in the system,
provided that you have a large c
1 - 100 of 156 matches
Mail list logo