Much has been written about RAID 10 vs RAID 01, but most seem to gloss over why one is better than the other, or go into mathematical details comparing the failure rates. While I love a good math discussion, I felt like there was a more intuitive way to explain it.| and1equals1.blogspot.com
Over and over, the IT crowd at the places I have worked have insisted on virtualizing every server, and over and over, Elasticsearch falls on its knees due to network latency accessing SAN storage from their VMs. I complain about the latency, and I hear that they'll switch me to the newest, fastest SAN technology, and that should "solve all my problems."®| and1equals1.blogspot.com
Recent versions of MacOS come with the hypervisor framework which makes virtualization possible. Not necessarily easy, but possible. Here are the steps I took to get a raw CentOS8 VM running on my system:| and1equals1.blogspot.com
I've been experimenting a bit with APFS and its ability to create and clone sparse files.| and1equals1.blogspot.com
From http://www.anites.com/2017/11/socat.html:| and1equals1.blogspot.com
I'm running macOS Mojave, and using it to host virtual machines via xhyve. There are some neat tricks one can use to conserve disk space while giving plenty of room to your VMs.| and1equals1.blogspot.com
I may occasionally publish small notes on clever commands I learn about. Putting it here helps me store knowledge that my shoddy personal data management practices might otherwise lose... One such note is a one-line sed command to print out the Linux interface(s) which handles the default route:| and1equals1.blogspot.com
I really like the "knocking harder" technique I developed. I haven't seen it mentioned in any other places, and it effectively gives the protected service a smart layer of obscurity with minimal effort and complexity.| and1equals1.blogspot.com
TL;DR: use xt_recent to allow persistent clients rather than block them.| and1equals1.blogspot.com
I found a way to use the built-in crypto functions to hash files on Windows systems using PowerShell. Paste the following lines into the PowerShell prompt, and specify one or more files when you run md5sum or sha1sum.| and1equals1.blogspot.com
There have been a few posts asking about moving a Linux file system from a raw partition onto an LVM. The advantages to using LVMs are numerous, but the advice has generally been to reinstall from scratch.| and1equals1.blogspot.com
Passwords and pass-phrases are an authentication method; they authenticate the user as the only one, at least in theory, who knows the correct phrase. With encryption tools, they serve an additional purpose; they either generate the symmetric key directly through one or more hashes (eg. cryptsetup), or they decrypt an existing stored key (eg. LUKS, GnuPG).| and1equals1.blogspot.com
I've discovered a great PAM module for using an SSH agent to authenticate the user for sudo access. I'm planning on installing it on all of my Linux servers.| and1equals1.blogspot.com
Certain government agencies feel they're within their right to seize and copy your data as you pass through their checkpoint if you fall into suspicion for some reason. With the presence of an encrypted partition known, they could also compel you to reveal the password. The idiocy is spreading due to the naive belief that security and privacy are a zero-sum game.| and1equals1.blogspot.com