Wandering Thoughts archives

2008-05-31: What contracts aren't
2008-05-30: The fun of awk
Users are rational
2008-05-29: Why web spiders should not crawl syndication feeds
2008-05-28: What promiscuous mode does on modern networks
2008-05-26: Shimming modules for testing (and fun)
2008-05-25: Making a good Unix glue language
The risks of forcing frequent password changes
2008-05-24: Dear applications: WEP keys are not passwords
2008-05-23: Frequent password changes as security mythology
2008-05-21: Combining dual identity routing and isolated interfaces
2008-05-20: Getting live network bandwidth numbers on Solaris
2008-05-19: Segregating your outgoing email to get blocked as little as possible
2008-05-18: The threat model for website logins
Counterproductive password security
2008-05-17: Why we're interested in many ZFS pools
2008-05-15: Why it is hard to decommission a DNS blocklist
What protects the strength of a ssh connection's encryption
2008-05-13: Things I have learned about ZFS (and a Linux iSCSI target)
2008-05-12: Some thoughts on tradeoffs between storage models
2008-05-11: The history of readdir()
Another problem with doing your own sysadmin automation
2008-05-09: An advantage of interpreted languages
2008-05-08: Getting live network bandwidth numbers on Linux
2008-05-07: Today's Solaris 10 irritation: the fault manager daemon
2008-05-06: The Bourne shell is not a programming language
2008-05-05: The costs of doing your own system administration automation
2008-05-04: On standard interfaces
2008-05-03: Why people don't automate sysadmin stuff
2008-05-02: Automation changes as systems grow
2008-05-01: What the co_names attribute on Python code objects is
By day for May 2008: 1 2 3 4 5 6 7 8 9 11 12 13 15 17 18 19 20 21 23 24 25 26 28 29 30 31; before May; after May.

Page tools: See As Normal.
Search:
Login: Password:
Atom Syndication: Recent Pages, Recent Comments.

This dinky wiki is brought to you by the Insane Hackers Guild, Python sub-branch.