I found the following document in one of my old archives. I thought I would share. Enjoy. DOUGHNUT ACQUISITION STANDARD PRACTICES DEPARTMENTAL INSTRUCTIONS [ Company Name ] Document Number D0N4T-COMPANY Effective Date: [insert date here] Table of Contents 1.0 PURPOSE … Continue reading
Michael
I use Fedoras built-in virtual machine facility. This uses KVM and QEMU. I’m not sure about all the specifics of the virtual machine engine. I know it works very well for my purposes though. My purposes are simply to test … Continue reading
I set up ecryptfs to test it and see how well it worked. These are the steps that I took to set it up. I am using Fedora so I used yum to install ecryptf. You should use whatever your … Continue reading
There are a lot of directions for this on the web. They missed a few things. Here are my directions references: http://cpan.org You will need about 2G of space. These instructions assume a fedora operating system. install CPAN::Mini # yum … Continue reading
This is a good start-up script or RC script for the Korn shell of the Bash shell. I modify it a little here and there depending upon what environment I am working in. It serves as a good general guideline … Continue reading
Obtaining a free certificate for a simple website is a handy thing to do. It provides not only enhanced security but good practice for later when you need to get more complicated certificates and embed them in a webserver. startcom.org … Continue reading
Starting in Bind 9.2.2P1, there is a new type of zone called delegation-only. It’s designed to counter wild-card records in TLD‘s, such as *.com. This is sometimes called the “Verisign patch” because, while Verisign was not the first TLD operator … Continue reading
Boot fails and drops into grub rescue mode After upgrading to fedora 16 from fedora 15 my system would not boot. The error was no such device : …long serial number …. entering rescue mode rub rescue> I believe the … Continue reading
AIDE – Advanced Intrusion Detection Environment This perl script uses AIDE to check if any files on a specified file system or directory tree has changed. It’s a fairly simple script, but it will work on clustered file system where … Continue reading
The purpose of this post is to discuss why short names are not a good strategy. First lets define a few terms. DNS – Domain Name System, simply put, an application that translates computer names into ip addresses. IP address … Continue reading