Tag: sysadmin

  1. Virtualbox virtual machines keep aborting.

    03 December 2015

    If you've been experimenting with different operating systems for a while, or you have some need to run more than one OS on a particular desktop machine, chances are you've been playing around with Oracle Virtualbox due to its ease of use, popular set of features, flexibility, and cost. You've also probably run into the following syndrome (usually while trying to build a new virtual machine):


    • You configure a new virtual machine.
    • You associate a bootable optical disk image with the new VM (for the sake of argument, let's say you're experimenting with the 50 megabyte(!) distro Damn Small Linux …

    Read more...

  2. Ubuntu Syndrome.

    11 February 2015

    Warning: Bitter BOFH ahead.

    There is a phenomenon I've come to call Ubuntu Syndrome, after the distribution of Linux which has become the darling of nearly every hosting provider out there (and no, I won't call them bloody cloud providers). All things considered, it seems to have a good balance of stable software, ease of use, availability, and diversity of available software. It also lends itself readily to the following workflow:

    • Use a tool like packer.io to automagically instantiate a copy of Ubuntu at the hosting provider of choice.
    • Never patch the machine under any circumstances.
    • Use Chef, Ansible …

    Read more...

  3. I don't think it was North Korea that pwned Sony.

    22 December 2014

    EDIT: 2014/12/23: Added reference to, a link to, and a local copy of the United Nations' Committee Against Torture report.

    I would have written about this earlier in the week when it was trendy, but not having a working laptop (and my day job keeping me too busy lately to write) prevented it. So, here it is:

    Unless you've been completely disconnected from the media for the past month (which is entirely possible, it's the holiday season), you've probably heard about the multinational media corporation Sony getting hacked so badly that you'd think it was the climax of …

    Read more...

  4. Ubuntu Linux and the Heartbleed OpenSSL vulnerability.

    07 April 2014

    If you're in the mad scramble to patch the Heartbleed vulnerability in OpenSSL on your Ubuntu servers but you need to see some documentation, look in your /usr/share/doc/openssl/changelog.Debian.gz file. If you see the following at the very top of the file, you're patched:


    openssl (1.0.1-4ubuntu5.12) precise-security; urgency=medium

    * SECURITY UPDATE: side-channel attack on Montgomery ladder implementation
    - debian/patches/CVE-2014-0076.patch: add and use constant time swap in
    crypto/bn/bn.h, crypto/bn/bn_lib.c, crypto/ec/ec2_mult.c,
    util/libeay.num.
    - CVE-2014-0076
    * SECURITY UPDATE: memory disclosure in TLS heartbeat extension …

    Read more...

  5. Problems cloning VirtualBox disk images.

    04 February 2014

    VirtualBox is a (mostly) open source virtualization stack designed to run on desktop machines. While you can run it in a "serious" fashion (such as using VMs to implement your network infrastructure) it really shines if you use it as part of your development effort.

    If you want to get under the hood the VBoxManage utility is the first place to start. It lets you do things like convert and manipulate disk images, something that I do from time to time at work these days. Until I ran into the following problem when trying to convert a VMDK virtual disk …

    Read more...

  6. Setting up AIDE in Kali Linux.

    17 June 2013

    Kali Linux (formerly Backtrack) is a distribution of Linux designed for penetration testers and information security professionals. I'll spare you the details - that's what Wikipedia is for - but I did want to post about a problem that I've been wrestling with for a couple of hours.

    Kali Linux can be installed and operated like any other distribution of Linux, which means that you get all of the nifty and handy tools that you'd expect to have, like AIDE for monitoring the file system for unauthorized changes. Unfortunately, because Kali is based upon Debian, and Debian over-engineers a lot of things …

    Read more...

  7. Logging into a Falcon RAID shelf.

    21 July 2011

    Publically posted for future reference by sysadmins everywhere.

    Regarding the Falcon RAID shelf, model ESA16G1B-0030 (3U high, sixteen SATA drive bays, hardware RAID, SCSI interface, two crappy serial ports (headphone jacks? really? you folks took this whole binary thing way too literally!), Ethernet jack, flip-out ears on the front with a rudimentary control panel on the left-hand side) from RAID, Inc. I just inherited one of these at work with no documentation, warranty, or support for it whatsoever. Consequently, I've spent most of a week trying to figure out how to set the damned thing up. Also, I haven't been …

    Read more...

3 / 4