Your JoeDog loves rear! And who doesn’t, amirite?
Except it’s not that rear. It’s an acronym for Relax and Recover, a Linux bare metal recovery tool.
Your JoeDog has been using Mondo for cloning systems. It’s good software that served him well despite difficulties moving from one hardware set to another. If Your JoeDog archived sd disks and recovered to cciss, then he was knee deep in i-want-my-lvm hell.
Rear makes those type of migrations much easier. If you archive a server using one type of disk driver and recover it to one that requires another, rear reworks the disk layout for you. It’s also configured to ignore external disks. If you archive a server connected to a SAN, rear simply ignores those multipath devices.
Like Mondo, you can archive and recover from an NFS server. Here’s a suggested configuration for NFS archiving. Place these directives inside /etc/rear/local.conf
To archive the system, run ‘rear -v mkbackup’
This configuration creates an ISO image called ‘rear-hostname.iso’ inside 10.37.72.44/export/hostname. To recover the server, burn that ISO onto a CD and boot the system with it. Select the Recover option then run ‘rear recover’ at the command prompt.
“It’s that simple,” Your JoeDog said with the zeal of a recent convert. He’ll be back to bitch about rear in a couple weeks but for now it’s nothing but love….
The Atlantic has an interesting article about depression and anxiety in the tech industry.
Yet certain elements of startup life and culture may make people particularly susceptible to depression. Stress, uncertainty, youth and isolation—the virtual cornerstones of today’s startup—have all been shown to increase likelihood of developing the disorder.Irregular work hours and constant high stress levels can lead to both social isolation and sleep disturbances, which can aggravate depression and make people even more volatile.It’s almost a perfect storm, says Maurice Ohayon, a professor of psychiatry at Stanford University School of Medicine. “Any psychiatrist can tell you that this population is particularly exposed,” he told me.
Most founders operate under a huge amount of pressure. They are responsible for employees, shareholders, and maintaining company morale, mostly before reaching the age of 30. And especially in the early stages of running a startup, they shoulder that burden mostly alone.
[Atlantic: Tech Has a Depression Problem]
When Your JoeDog lived in Manhattan his car had traditional locks. Thieves frequently jimmied those locks and took whatever they could find inside the vehicle. One morning before work, he was seen carrying a new battery down Second Avenue after his was stolen the night before.
He finally solved this problem in 1993 by installing a red light below the dash. The light didn’t do anything other than illuminate but thieves figured Your JoeDog had a fancy pants alarm and moved on to the next car.
In 1998, Volkswagen introduced sidewinder keys to thwart lock jimmiers. These keys had a flat metal blade with a wavy groove down the center. They had an identical cut on the reverse so the key could be inserted either way. They were also known as internal cut or laser cut keys.
Starting in October 2000, Volkswagen added a transponder chip for additional security. This type of key is now found on a wide array of vehicles.
The video at the top of this post is generating a stir. It features a lock picking tool for sidewinder locks. After a little fiddling inside the enclosure, the tumblers seem to adjust to the tool and the door opens for the intruder. He’s able to turn the ignition with even less effort. Fortunately, the car doesn’t start. It’s probably looking for a signal from the transponder chip.
So while your car may remain in its parking spot, as Your JoeDog can attest, once thieves gain entry they can wreck your entire morning. A battery gets pretty heavy after just one block. Imagine lugging one for seven more….
[Digg: If You Live In Bangkok Here's How Your Car Will Get Stolen]
Yesterday there was a flurry of reports about five million hacked GMail accounts that were posted online. A large number of people were understandably alarmed. This is the type of breach that can expose a victim to identity theft.
The GMail credentials first appeared on btcsec.com, a bitcoin security forum. They were posted by someone named TVSkit. He was described as Russian, probably due to his penchant for funny characters since the forum is a Russian language site.
Soon after the initial wave of reports, Google weighed in on its security blog. The company harvested the posted login credentials and checked them against their internal records. According to the company, less than 2% were valid and even fewer could be used to access an account.
In the wake of this report, there was another round of breaking news. Google probably wasn’t hacked but you should probably change your password anyway, the media said as it turned its attention to the next shiny object. No. What you should do is setup two-step verification.
In all likelihood, this stir was caused by an adolescent copy-and-paste hacker who grabbed someone else’s credential sheet and used it to bolster a claim about a non-existent GMail breach.
You may see a few more “Loading…” images today. Several prominent companies are participating in Internet Slowdown Day. While they’re not actually throttling their sites, they are featuring those images in order to make a point: without net neutrality, much of the Internets could slow to a crawl.
The demonstration is part of a larger effort to persuade the FCC to enact stronger protections for net neutrality. Some Internet Service Providers would like to create “Fast lanes” in which websites can pay for higher priority and faster traffic. Sites that don’t pay the premium will perform poorer than those that do. It may surprise you to learn that Your JoeDog doesn’t have pockets as deep as Microsoft. In a fast-lane universe, his site will resemble a sleeping tortoise.
Thus far, more than a million comments were submitted to the FCC. The vast majority of them support net neutrality. You still have time to add your voice. Comments are open until September 15th.
A few months ago, Facebook changed its policy and began setting videos to auto-play. This is particularly annoying on phones and tablets where you can pay for data usage. But it’s also annoying on web browsers. Your JoeDog uses the Vimium plug-in for Chrome which gives him vi-bindings for navigation. He scrolls down with ‘j’ and up with ‘k’. Auto-play breaks vimium. Oh, noes!!1!!!1!
Here’s how to to stop videos from auto-playing on Facebook.
First navigate to Settings. On mobile, it should be an option on the left hand navigation menu. In your browser it’s a little more tricky to find. Look for the privacy menu on the top blue banner. It’s a small menu with a lock:
This will present a Privacy menu. Scroll down to the bottom to “See More Settings” Click that and it will take you to the Privacy and Tools page. On the left hand side you’ll see a navigation menu. Look for “Videos.” On my nav it’s the last item. That link will take you to Video Settings. From there you can turn off Auto-Play
Your JoeDog has a new look and feel!
The theme remains the same but we’re rocking a better architecture. The previous version was close to six years old and I made a poor design decision. What was that? I used HTML tables instead of CSS. It was a bad decision then but it’s inexcusable now. Don’t use HTML tables …. ever!
CSS has numerous advantages over HTML.
- It eliminates the need for a clipboard. If somebody refers to you as a copy-and-paste programmer, that’s not a compliment. Redundant code is hard to maintain. CSS allows you to manage pages with a single file.
- HTML tables contain large amounts of markup. With CSS, you can reduce much of that, lower your site’s overhead and create faster loading pages.
- Site redesign is so much more efficient with CSS because it decouples content from its presentation.
- CSS is better for SEO because it boosts your content to code ratio and it better enables you to signal which items you want to emphasize.
- And the biggest reason CSS is superior to HTML: NO SPACER.GIFs
Now Your JoeDog is no CSS design expert but he knows what he likes: a header and three columns — one for navigation, one for content and one for ads. You’re not blocking his ads, are you? They help pay the bills.
I highly recommend his templates. If you’re having difficulty implementing them, feel free to steal code and ideas from this website. (In particular, look for the .main #content tag. Your JoeDog used that to prevent Taylor’s floating blocks from crushing his margins and padding.
Well? Is it?
How’s this for a definitive answer: “Yes and no.”
We find the answer in RFC 2616 section 14.23:
The Host request-header field specifies the Internet host and port number of the resource being requested, as obtained from the original URI: “Host” “:” host [ ":" port ]
A “host” without any trailing port information implies the default port for the service requested (e.g., “80” for an HTTP URL).
So if an HTTPS request is made to a non-standard port, say 29043, then you should send a port even though the RFC doesn’t compel you to. And if you make HTTP or HTTPS requests to standard ports, then it’s probably best to omit the port string.
The above is my interpretation. I’ve maintained an HTTP client for thirteen years and this has been a point of contention. In the course of all that time, I’ve added and dropped :port from the header. Like Jason in a hockey mask, it keeps coming back. In its latest iteration, siege implements the interpretation you see above. If the port is non-standard, it appends :port to the string. If it is standard, then it simply sends the host.
Look for this feature in siege-3.0.8
I like C. It’s probably my favorite language. Yeah, yeah, sure, it doesn’t have support for objects but that doesn’t mean you can’t write your own. Fido was written in C but it has an object-oriented architecture. This design makes it easy to debug memory problems and simple to re-use code. (I use the same hash table in all my projects.) So I like C but it also sucks. Version 1.1.1 of this application contains a bug that wouldn’t have compiled in other languages. C was all, “What? You want to do something stupid? Okay, fine.”
As a result, fido-1.1.1 doesn’t trigger an alert when a file reaches its target age while logging is turned on. All fido users should upgrade to fido-1.1.2.tar.gz
Here’s the format for a location header, Location: absolute_url
Unfortunately, many developers don’t care about standards and Internet Exploder is famous for letting them get away with it. When siege followed the letter of the law, I was inundated with bug reports that weren’t bugs at all. If siege is confused by Location: /haha that’s your developer’s problem, not mine. Against my better judgement and beginning with siege-3.0.6, I started constructing absolute_urls from relative paths. Unfortunately, my parser missed a usecase: localhost. Siege 3.0.6 will barf on this:
Technically, I didn’t miss localhost. If you look at url.c:459 you’ll see this:
// XXX: do I really need to test for localhost?
It didn’t occur to me that people would run siege on the same server as their webserver. My bad. There are many tests besides load tests.
All siege users running version 3.0.6 should upgrade to siege-3.0.7.tar.gz