Raven, corporate courtesan wrote:
> How about something positive, then? "A Practical Guide to...", "A
> Down-to-Earth Guide to...", "Things I Wish Someone Had Told Me When I
> Was Learning Computer Security"... [grin]
And James Sutherland said:
> "Basics of ..." or "... for beginners" sou
Hi folks,
I'm trying to solve a mystery, and at the same time, figure out good metrics
to determine our server speed, network speed, capacity, etc.
One database-driven page in particular loads *extremely* slowly (like,
minutes), from several computers in the client's office. I've NEVER had the
> I'm trying to solve a mystery, and at the same time, figure out good metrics
> to determine our server speed, network speed, capacity, etc.
tough order :)
> One database-driven page in particular loads *extremely* slowly (like,
> minutes), from several computers in the client's office. I've
In classical security thought.. once someone has physical access to a box (router,
workstation, etc) they are assumed to "own" the box.. and in most cases this is quite
true.. so physical security, policy.. grr
ARRRGGHH.. must stop security babble! okok.. moving on..
Additional steps(keeping a
since we are talking about rescue systems.. just thought I'd through some stuff out
that I've found TRULY useful:
The coroner's toolkit (qsome forensic and file recovery tools):
http://www.fish.com/tct/
Linuxcare's bootable business card:
http://open-projects.linuxcare.com/BBC/download.epl
Tom
Just a note about physical security.. keep in mind.. if your physical security plans
aren't realistic... you may end up creating a worse situation.. ie. lets take a door
where you have to use 10diffrent bio-scans to get into the facility.. and people have
to do it constantly.. how long do you t
linux specific:
(short list to get you started)
Resources:
books:
http://www.hackinglinuxexposed.com/
http://www.oreilly.com/catalog/puis/
links:
http://www.linuxdoc.org/LDP/solrhe/Securing-Optimizing-Linux-RH-Edition-v1.3/index.html
http://www.securityportal.com/lasg/
http://www.linuxsecurity.c
On Tue, May 15, 2001 at 04:13:41PM -0500, Daniel Manrique wrote:
> Do you know for sure that the page itself isn't the problem? if you need
> data from a complex query to build the page, it might be that the database
> is suffering. In this case maybe checking what the heck the database is
> doing
On Tue, May 15, 2001 at 10:11:14AM +1000 or so it is rumoured hereabouts,
[EMAIL PROTECTED] thought:
> David Merrill wrote:
>
>
> > I like `backgrounder' or `introduction to...'. I don't particularly
> > like `layman', mostly because after reading your docs I don't think
> > they are useful onl
On Mon, May 14, 2001 at 08:16:51PM -0500 or so it is rumoured hereabouts,
Daniel Manrique thought:
>
>
> However, I don't see why they make such a big fuss about it; after all,
> Linux has backdoors too so there's no difference between them.
>
'cos you can find and close the backdoors with op
On Mon, May 14, 2001 at 02:38:35PM -0500 or so it is rumoured hereabouts,
Samuel Tesla thought:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> On Mon, 14 May 2001, Brian Sweeney wrote:
>
> > I read a really good book a while back called "Physics for the Rest of
> > Us"(HIGHLY recommended
> >
> >
> > However, I don't see why they make such a big fuss about it; after all,
> > Linux has backdoors too so there's no difference between them.
> >
>
> 'cos you can find and close the backdoors with open source stuff (or was
> that irony above?).
I was deliberately mocking the entire "
>
> When my phone service carrier was Pacific Bell I could connect to my ISP at
> speeds between 46k & 50k. However, when I changed my carrier to Cox
> Communications the connection speed dropped to 34k. Now whenever I connect
> to my ISP the speed is always 34k. I have changed nothing & my modem
> Just a note about physical security.. keep in mind.. if your physical
security plans aren't realistic... you may end up creating a worse
situation.. ie. lets take a door where you have to use 10diffrent
bio-scans to get into the facility.. and people have to do it
constantly.. how long do you th
> On Tue, May 15, 2001 at 04:13:41PM -0500, Daniel Manrique wrote:
> > Do you know for sure that the page itself isn't the problem? if you need
> > data from a complex query to build the page, it might be that the database
> > is suffering. In this case maybe checking what the heck the database is
Issac Asimov is a good man ... i always enjoyed reading his science and
his philosophy :)
but seriously, regarding the titles of books ... i don't understand how
anyone can really care .. if it's an excellent book, should it matter that
it's titled "linux for the computer illiterate?" or how abo
> Daniel Manrique thought:
> >
> > However, I don't see why they make such a big fuss about it; after all,
> > Linux has backdoors too so there's no difference between them.
> >
>
> 'cos you can find and close the backdoors with open source stuff (or was
> that irony above?).
linux has backdoo
> > >
> > > However, I don't see why they make such a big fuss about it; after all,
> > > Linux has backdoors too so there's no difference between them.
> > >
> >
> > 'cos you can find and close the backdoors with open source stuff (or was
> > that irony above?).
>
> I was deliberately mocking
> > When my phone service carrier was Pacific Bell I could connect to my ISP at
> > speeds between 46k & 50k. However, when I changed my carrier to Cox
> > Communications the connection speed dropped to 34k. Now whenever I connect
> > to my ISP the speed is always 34k. I have changed nothing & my
At 5/15/01 06:38 PM , coldfire wrote:
> > Just a note about physical security.. keep in mind.. if your physical
>security plans aren't realistic... you may end up creating a worse
>situation.. ie. lets take a door where you have to use 10diffrent
>bio-scans to get into the facility.. and people ha
Actually, one of my favorite newbie books is Linux for Windows Addicts. Given
that a lot of folks come to linux from windows (as opposed to it being their
first introduction to computers at all), it's rather nice in that it gives a
lot of equivalents.such as "this thing I'm telling you about
Heya --
Quoth Michelle:
> I'm trying to solve a mystery, and at the same time, figure out good
> metrics to determine our server speed, network speed, capacity, etc.
Hoo boy. Good idea, but these are three separate issues, so
you're going to have to troubleshoot and benchmark each one sepa
Heya --
Lots of networking questions today!
Quoth Davida:
> I was wondering if anyone else has encountered this problem:
> When my phone service carrier was Pacific Bell I could connect to my
> ISP at speeds between 46k & 50k. However, when I changed my carrier
> to Cox Communications the
Heya --
Lots of networking questions today!
Quoth Davida:
> I was wondering if anyone else has encountered this problem:
> When my phone service carrier was Pacific Bell I could connect to my
> ISP at speeds between 46k & 50k. However, when I changed my carrier
> to Cox Communications the
Heya --
>> "So what sort of presentation software are you using?"
>> "Ummm, vi."
>> "Oh. Is there a conversion program for that? I can't read
>> these files in NT. Maybe you should use Windows."
>> -- a recent conversation with our new technical management
>
> Heh. Ignorance, hmm?
Yu
On Tue, May 15, 2001 at 07:11:18PM -0700, Raven, corporate courtesan wrote:
> There are a few different ways to test your throughput. Many ISPs
> will have test files that you can FTP to and from them to use up all
> the available bandwidth. Or, you can try to pingflood your line
Try runn
26 matches
Mail list logo