It's been almost eight years since my last build and it is time to build a new one. This time I plan to go even smaller having recently acquired an ncase M1. I'd love to get feedback from the community to sanity check the build and make sure I'm not doing something dumb here.
The plan is it use...
Is this with stock voltages and PBO enabled/stock ?
I'm in the middle of considering a 3700X + NH-L9A + Dan A4 SFX myself and I'm just trying to figure out to expect.
I'm getting the sense that this setup is very borderline based on what I've been reading. Thinking of dropping to a 3600.
Maybe its worth reconsidering your entire back up strategy and use file level backup tools instead.
File level backup tools are nice as they don't lock you in to a proprietary backup system to recover your files. The back ups are still readable via standard tools (they are just files after...
Agreed. Out of all the computer parts I've worked with in my career, HDDs are the ones I've had to RMA the most. It makes sense to be honest as they are one of the few moving parts in a PC.
You can run two subnets in the same broadcast domain (i.e. without VLAN). I wouldn't recommend it but it can be done. If both subnets need WAN access it will require a router that allows you assigning an arbitrary number of addresses to a single interface. Probably would need an aftermarket...
TEMPEST is a NATO program dedicated to understanding and mitigating nonstandard and side channel exfiltration of data.
TEMPEST mostly deals with hardware that is operating properly, beyond that there are also ways of compromising machines so that data can be exfiltrated in the presence of a...
iptables and pf are both stateful firewalls. It may not have DPI, do transparent proxy other fancy UTM features, but I disagree with the statement that they are not firewalls.
Just checking my ERL with 1.6.0 firmware, root device is mounted ext3 with journaling and barriers enabled that should be pretty resilient to power loss corruption. I've never had a problem with mine losing power and not coming up.
Hashing is the slowest way to compare files.
Comparing hashes requires you to read both files in their entirety before making a comparison.
Contrast with the process below.
Check the file size, if different files are different and done.
Check modification time, if different treat files as...
diff from diffutils can do this no problem.
The standard invocation is smart enough to detect binary files and give a simple yes/no answer. Otherwise you can force it to give a yes/no only with a '-q' option.
diff [file1] [file2]
Pretty sure there are Windows ports available.
If each port had its own interface then each could be on its own isolated network (without resorting to VLANs), with routing and firewall rules dictating what traffic can go where.
Take for example the UBNT EdgeRouter PoE. It has 5 network ports each of which is its own interface (eth0-4)...
Generally consumer routers only have two wired interfaces. One each for WAN and LAN. Typically the LAN NIC will be connected to a L2 switch IC which will be wired up to the multiple LAN ports you see on the outside of the chassis.
Picture for clarity.
L2 switches do not typically have MAC...
There are a bunch of zfs-snapshot scripts on Github that can easily be called from cron.
I use this one: https://github.com/zfsonlinux/zfs-auto-snapshot
Simple and to the point.
You can find the API docs for Gecko at https://developer.mozilla.org/en-US/docs/Mozilla/Gecko
If your looking to embed Gecko in your own application you can refer to the Embedding Mozilla section of the docs.
There are also various API bindings already for various languages such as PyXPCOM for...
Block level wiping is pretty old hat at this point and not sufficient for sanitizing data anyway as LBA is an abstraction of physical storage and not a direct mapping.
If you're wiping a drive you should be using the ATA Secure Erase command. On HDDs using FDE and most SSDs this command is...
I have no clue why turning it off in chkconfig isn't working, but as an alternative you can set the default policy, flush the input chain and then save the config. This way even if it starts your firewall isn't stopping anything. (Repeat if necessary for FORWARD and OUTPUT chains.)
(as root)...
Even if you have an B-B patch connected to a A-A cable, connected to a B-B patch the electrical connections all line up, so mixing and matching should never be an issue as long as each segment is actually done correctly. Heck, even mixing and matching straights and crosses isn't really an issue...
Using NOOBS is the easiest way these days. Partition the SD card MBR style with one large FAT32 partition. Copy the NOOBS content to the partition, put card back in Pi2 and boot it.
NOOBS will redo the partitions during the install procedure as appropriate.
Add a second IP address in the desired subnet to the gateway's LAN interface.
GW IP #2: 10.10.11.1/24
PC IP: 10.10.11.30/24
Running two subnets in the same broadcast domain like your intending is fine, but it isn't really isolation. It can prevent mistakes, but not malicious activity, for more...
Cat5e is standard for 1GBase-T. It will also run 2.5G and 5G NBase-T if that ever becomes a thing.
Cat6 isn't called for by any standards (and may or may not run 10G for short runs, ymmv).
Cat6a is standard for 10GBase-T but its much harder to work with and terminate properly.
I see no...
FIPS covers implementation of crypto primitives, but how those primitives are used is just as important as choosing them. I can use a FIPS compliant implementation of an AES256 cipher in my crypto system, but if I use the same key for every ciphertext I've created a horribly broken crypto...
In fairness the audit team wouldn't have been looking for code injection exploits, and assuming they were, they would have been only concerned with the components in the crypto system itself. The vulnerability isn't a cryptographic weakness.
Regarding MS code auditing, without knowing who, if...
Security benefit, none. Assuming proper implementations HW/SW doesn't make much a difference from a security standpoint.
HW FDE is great because its transparent to the OS, it also makes ATA Secure Erase a fast and very secure (just regen the hw key). It's also pretty fast, as the cypto is done...
Proper design of a crypto system not only involves picking appropriate crypto primitives but also in how the crypto primitives are configured and used within the system. FIPS certified primitives are useful for building secure crypto systems but how they are used is also important as a crypto...
Excellent list of applications for various tasks can be found on the Arch Linux wiki (the info is good for Linux in general though)
https://wiki.archlinux.org/index.php/List_of_applications
I use Arch Linux as a daily driver. It is a rolling release distro that strikes a nice balance between...
I've had FIOS for years, and used option 2. I use a UBNT EdgeRouter Lite as my gateway which is directly connected to the ONT. I still keep the ActionTec as a MoCA bridge inside my LAN so the set-top boxes continue to work (guide info and VOD).
When I set my network up originally the early...
Assuming the drive is directly accessible to the OS, then hdparm should do the trick.
There is tons of info out there, read it carefully as hdparm used incorrectly can brick drives.
http://linux.die.net/man/8/hdparm
https://wiki.archlinux.org/index.php/SSD_memory_cell_clearing...
This is a really excellent post.
Your 100% correct about being able research skills being a big factor in being an effective developer. Knowing how to find and read user guides, specifications, APIs, bug reports, etc is just part of the job.
People who ask poor quality questions, get poor quality responses. If you make an effort to write a detailed question that shows some basic research, you'll usually get a great response. If not then it is usually a duplicate or it is unanswerable for a variety of reasons.