Skip to main content

Matt Fahrner

Matt Fahrner's Public Library

  • "war is to man what maternity is to the woman"

  • Democratic regimes may be described  as those under which the people are, from time to  time, deluded into the belief that they exercise sovereignty, while  all the time real sovereignty resides in and is exercised  by other and sometimes irresponsible and secret forces. Democracy  is a kingless regime infested by many kings who are sometimes more  exclusive, tyrannical, and destructive than  one, even if he be a tyrant.
  • The  maxim that society exists only for the well-being  and freedom of the individuals  composing it does not seem to be in conformity with nature's plans, which  care only for the  species and seem ready to sacrifice the individual
  • where balance is achieved between interests and  forces of the economic world. Such a  glance is only possible within the sphere  of the state, because the state alone  transcends the contrasting interests of groups and individuals, in view of  co-coordinating them to achieve higher aims.

1 more annotation...

  • Overview of BIG-IP VE license and throughput limits

  • Overview of BIG-IP Virtual Edition image sizes

  • Bootstrap is the most popular HTML, CSS, and JS framework for developing responsive, mobile first projects on the web.
  • Bootstrap is the most popular HTML, CSS, and JS framework for developing responsive, mobile first projects on the web.

  • Junosphere

     

    Cloud-based network testing, design, and training environment

     

    A cloud-based service that allows networking professionals to perform network testing, design, and training exercises in a risk-free virtual environment using real network operating systems.

  • Security experts say that most products, once they lose support, can no longer be trusted to be secure. "The point when older kit should be jettisoned is simple - when it is no longer supported 'properly,'" University of Surrey's Woodward says. "I would also say that if some fundamental flaw is found in the software or hardware then it should also be binned. It is very easy for people to forget equipment that is performing a vital security task and at that point you are the weakest link."
  • 5. Continuously Monitor Your Networks

     

    Clearly, any component of IT infrastructure - especially firewalls and VPN appliances - is a target for enterprising attackers, be they foreign intelligence agencies, cybercrime gangs or teenagers with too much time on their hands. "If you run a firewall installation at a large organization, now would be a good time to start logging incoming traffic for oddities," British researcher Al-Bassam says via Twitter.

      

    Honan, who founded Ireland's first computer emergency response team, says monitoring is a must. "CISOs must implement continuous monitoring of all systems to know what normal operations look like on their network, so that any unusual usage patterns can be examined further to indicate if there is a compromise," he says.

  • Malware? Tear it apart, discover its ins and outs and collect actionable threat data. Cuckoo is the leading open source automated malware analysis system.

  • What is PacketFence?

     

    PacketFence is a fully supported, trusted, Free and Open Source network access control (NAC) solution. Boasting an impressive feature set including a captive-portal for registration and remediation, centralized wired and wireless management, powerful BYOD management options, 802.1X support, layer-2 isolation of problematic devices; PacketFence can be used to effectively secure networks small to very large heterogeneous networks.

     

    Released under the GPL, PacketFence is built using trusted open source components that allows it to offer an impressive amount of features.

  • There’s a $200k reward for anyone who proves Microsoft ripped off MS-DOS source code

  • Stop Spotlight from Indexing Time Machine Backup Volumes & External Drives

  • How can I selectively override some A records on a Bind DNS Server?
  • However, if you want to do this with DNS, using BIND as the resolver server, and you need to override specific names only (rather than whole zones), I believe you will need to use the Response Policy Zone (RPZ) functionality. This can possibly be done in conjunction with the use of views in order to make these changes only affect specific clients.

  • Global Information Assurance Certification

  • Moving Fusion VMs to ESXi
    • Open Terminal.
    •  
    • Run the following command, inserting the correct VMWare Fusion vmdk file source and new vmdk destination:

         
       

      /Applications/VMware\ Fusion.app/Contents/Library/vmware-vdiskmanager  > -r /path/to/vmware_fusion.vmwarevm/vmware_fusion.vmdk -t 4 /path/to/esxi.vmdk

    •  
    • The conversion process, once complete, will create two files: filename.vmdk, and filename-flat.vmdk.
    •  
    • Launch the vSphere client through your web browser to your ESXi server.
    •  
    • Once logged in, go to File | New | Virtual Machine
    •  
    • In the Configuration window, select Custom.
    •  
    • In the Storage window, select the datastore location to store the new VM.
    •  
    • In the Virtual Machine Version window, use the default option of Virtual Machine Version: 8.
    •  
    • Select the desired settings for Guest OS, CPUs, Memory, Network, and SCSI Controller.
    •  
    • In the Select a Disk window, choose the Do Not Create Disk option.
    •  
    • Click the Finish button.
    •  
    • In the ESXi server settings, select the Configuration tab then click on Storage.
    •  
    • In Storage, select your datastore and right-click to select Browse Datastore.
    •  
    • Select the folder name that corresponds to the new VM.
    •  
    • Select the Upload button.
    •  
    • Upload the filename.vmdk and filename-flat.vmdk files from Step 3.
    •  
    • Once complete, you will only see the filename.vmdk file in the datastore.
    •  
    • Select the VM and Edit virtual machine settings under the Get Started tab.
    •  
    • Click the Add button in the Virtual Machine Properties window.
    •  
    • For Device Type, select Hard Disk, and choose Use an existing virtual disk.
    •  
    • Locate the datastore and select the existing disk.
    •  
    • In the Advanced Options, leave the default settings.
    •  
    • Select Finish and OK to close the Virtual Machine Properties.
    •  
    • At this point, you should be able to boot to the newly migrated VM.
  • Guidance for this came from MacTech's June 2013 issue, reproduced at the author's blog here. Many kudos to Rich Trouton for this article.

     

1 - 20 of 781 Next › Last »
20 items/page

Highlighter, Sticky notes, Tagging, Groups and Network: integrated suite dramatically boosting research productivity. Learn more »

Join Diigo