Author: W. Curtis Preston ISBN: 0596001533 Publisher: O’Reilly While storage capacity has grown (almost as fast as the amount of data we want to store!) our ability to manage and backup critical resources has been lagging behind, and is only just emerging from the dark ages. Although a couple of 250GB hard drives and a DVD burner may be an adequate solution for a home user, a company with large databases, shared file servers, remote home directories and tight data recovery windows needs something more; this book presents the two best options. Read on →

I’ve just finished reading Using SANs and NAS by O’Reilly, in short it’s a great book for picking up the basic principles behind both SANs, NAS and using fibre channel to connect them together. The book doesn’t really delve in to the technical details which means it’s aged pretty well. Taking its place I have Cisco Routers for the Desperate which provides an quick and easy way to get up to speed on the basics of using Cisco routers. Read on →

I’ve spent a lot of time today installing Debian boxes and testing build documents. After using both the old and new installers (Sarge installer RC2) I’ve come to a bundle of conclusions. The new installer hides a lot of the complexity from most users (use expert mode to get it back). It has a better screen for per-partition options (although it does make you do each one on a separate screen) and it flows a lot better. Read on →

Version control rocks, it allows you to roll back anything you’re working on to a previous version and remove all the late night weirdness you can’t remember adding. While it’s hard to beat the power of the CVS command line interface or the easy of use of TortoiseCVS there is a third option: CVSWeb. Written and maintained by FreeBSD people, CVSWeb provides an easy to use, web-based, interface to your CVS repositories. Read on →

I’ve made a couple of posts about the yellow fade technique but now I’ve got a script to one-up it. The people over at Axentric (Adam Michela) have put together a Fade Anything Technique that does pretty much what you expect from its name. The Fade Anything Technique demo is pretty impressive and the code is both readable and clean. For now it’s my winner in this little competition.

As I mentioned before I was heavily involved in putting this meeting together. And it seemed to go pretty well! We had three speakers but we had to shuffle the order around a bit, one was a little late and one was having technical problems. With very little time for preparation Pete Ryland stepped up and drew in the crowd. There were actually a couple of people from Ubuntu (and the Debian UK mailing list) which added a fair amount of clue to the audiences questions. Read on →

The one thing I’ve learned over the years, although I’m only just starting to realise exactly how much an effect it has on me, is that you should try to surround yourself with smart people. They keep you busy, entertained, challenged, constantly improving and every now and again drop a nugget of pure gold into your lap; completely free of charge. This weeks blinder was from Harry and has given me the arse-kicking I needed.

Walking around the back-streets near Oxford Street at night you often see strange things but I saw one this week that gave me a chuckle. The first car pulls up to the traffic lights, it’s a shiny maroon Jaguar XK8 with a white-guy decked out in gold sitting at the wheel. His head is bobbing up and down and you can feel the base of Zed Bias “Neighbourhood”, a garage track that used to be very popular as a between song filler, from across the street. Read on →

If you ever want to collect a cross-section of the more common Windows email viruses then I’ve got a tip for you. Post a job advert on a couple of the bigger jobsites (Jobserve, Monster etc.) and then wait a day for the agents to start submitting CVs. Reply to them saying no thanks so you get added to their local address books and then watch as every variant of Bagel, Klez and all the other little bits of shite come flooding in to your inbox. Read on →

Firstly let’s define Phishing, “The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.” While most phishing attacks are done over the web consider how they could be tailored to abuse email and local address books. Lets consider a scenario, a non-technical (and busy) receptionist or assistant (Alice) sends a number of email’s from her pet executive to certain people outside the company. Read on →