Tag: computers

  • first, draw a safe on a cardboard box

    New from O’Reilly/Syngress: How to Cheat at Designing Security for a Windows Server 2003 Network. I realize that “How To Cheat At” is a book series, but how could a title like that get past an editor and the book’s author without any red flags being raised?

  • Did this need to exist? I don’t think it did.

    “Thanks” to Brad, this entry was posted with Excel.

  • These are not the pants you think they are

    Someone’s not proofreading. Also, these pants are a pain to iron. (Also annoying: I have to use User Agent Switcher to claim to be IE when I use Firefox in Linux to go to gap.com, otherwise it complains and tells me that on a PC I should use Firefox 1.0 or greater. Nice failure mode.)

  • This is the most annoying hardware problem ever.

    I have an Ultra 10 at work which handles mail for a small group of users who haven’t moved onto Notes for whatever reason. Lately it’s been hanging over the weekend: console reports that /var is full and / is out of inodes, and a hard reboot brings it back up without a full /var […]

  • true motivation

    “Validating your copy of Windows not only keeps your business in good hands, it can put your hands around a great cup of coffee by using your $5 Tim Hortons Gift Certificate.” Canadians like their Timmy Ho’s, but that’s just bizarre.

  • my first idea begins with “rtf”.

    From freenode #amavis: <symtab> hello, i get this error <symtab> The value of variable $myhostname is “yggdrasil”, but should have been a fully qualified domain name; perhaps uname(3) did not provide such. You must explicitly assign a FQDN of this host to variable $myhostname in amavisd.conf, or fix what uname(3) provides as a host’s network […]

  • Yak shaving

    This has been one of those weeks. Mostly the problem has been yak shaving — where to get one thing done you find yourself in a pile of other related but annoying tasks. For instance, yesterday someone needed to move an old SparcStation 5 that acts as a terminal server onto a new subnet. Yak […]

  • Nifty keypad attack

    What do you do if you want to steal someone’s door code, bank card PIN, safe combination, etc., when you can’t watch them enter it, and checking fingerprints afterwards is too inconvenient? Just take a thermal image after they’ve left.