Author: Robert Buccigrossi
April 12, 2006
Recovering RAID on Linux in Rescue Mode
The software RAID on Linux works very well. Our backup machine (still using Red Hat 9) uses a RAID‑5 with 6 drives: 4 hot and 2 reserve. When a main drive fails, a reserve is auto-magically brought in (thanks to the “md” daemon).
But last Sunday…
December 15, 2005
Copying Text from Encrypted PDF Files
PDF encryption is sort of silly. If you really wanted to grab the text, you can screen capture each page and then OCR it. So clearly the true intention of the encryption is to deter the 99% of the users…
December 14, 2005
The Promise of Ajax and DOM: Simple Event-Driven Widget-Based Web Applications
As a Web developer, I have a confession to make: I prefer writting desktop applications.
In an enterprise-level Web application, just to get a usable display tier you need to perform gymnastics in JavaScript, CSS, HTML, JSP, Java, and Struts (a similar set of gymnastics…
September 14, 2005
Experiments in Rapid System Restoration using Tardiff
One great feature of Linux and other Unix variants is that you can quickly make a “bare metal” restoration or duplicate of a system provided you have a full backup of the original. (With Windows, the registry requires special tools in order…
September 9, 2005
Running Linux Fedora Core 2 on VMWare 4.0.0
At TCG, many of our servers are running Fedora Core 2. As an emergency restore technique, I wanted to be able to quickly recreate a server on a VMWare virtual machine running FC2. In addition, virtual machines are a great way of quickly creating…
August 4, 2005
DefCon: Web Service Intrusion — Same Security Holes, New Technology
At DefCon 13, Alex Stamos of iSec Partners gave a very interesting talk entitled “Attacking Web Services”. In summary, there are currently three known web service attack techniques:
Injecting XML into an input box, overwriting tags set earlier in the SOAP…
July 30, 2005
DefCon: Google Ads Phishing Security Alert
DefCon (http://www.defcon.org) is a large annual hacking conference that attracts corporate security personnel, federal agents, and of course, hackers. DefCon is significant since hackers use DefCon as a forum to unveil security vulnerabilities in tools and utilities we use daily. The first…