Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:Out-of-the-box babysitting of processes (Score 1) 928

by Deagol (#48278397) Attached to: Ask Slashdot: Can You Say Something Nice About Systemd?

Quickly respawning processes that die is not HA. Clustering and fail-over at the application and hardware layers is HA.

A flapping service can cause more customer-facing downtime or irritation than a permanently-down service that's failed over gracefully at the appropriate layer.

Comment: Re:Out-of-the-box babysitting of processes (Score 5, Insightful) 928

by Deagol (#48277371) Attached to: Ask Slashdot: Can You Say Something Nice About Systemd?

Maybe I'm unique in this regard, but as an admin, if something goes down on one of my servers, I want it to stay down until I intervene.

Firstly, if I'm properly monitoring the process, then I'll be alerted and can investigate.

Secondly, there may a *reason* the process goes down, and having it down may be a good thing. If someone's trying to fuzz our httpd process for exploitation, then it happily restarting will open up a wider attack window.

Autopilots on production servers seem like a bad idea to me.

Comment: Re:There are no "remote" exploits for bash (Score 2) 329

by Deagol (#48019003) Attached to: Bash To Require Further Patching, As More Shellshock Holes Found

If you're on the RHEL security/patch list, you may have noticed a huge number of updates to ksh over the past couple of months. I found this odd -- until the recent shellshock thing went public. Perhaps this class of attack works against ksh as well? Looks like code reviews of core OS binaries may be ramping up since heartbleed.

Comment: Re:Break Their Legs and Put Them in the Everglades (Score 1) 235

by Deagol (#43005489) Attached to: 'This Is Your Second and Final Notice' Robocallers Revealed

Do you speak from experience of using this technique? Or are you summarizing other online accounts?

As someone who filed personal BK 15 years ago, I have mixed feelings about this. On the one hand, I am a strong believer of personal responsibility. But on the other hand, I loath the credit and debt collection industry with every fiber of my being, with their many awful tactics.

What you describe sounds like anyone could default on any old legitimate debt and then with some paperwork and brass balls simply get away without paying it back. Why the fuck shouldn't I max out my credit, stop paying the house, car, and credit car bills, and then reap the benefits of getting in the clear? This seems too easy (court/legal legwork aside).

Comment: Re:personal experiences (Score 1) 504

by Deagol (#40812613) Attached to: Can a Regular Person Repair a Damaged Hard Drive?

Dude, get a few of these:

The benefits of the external trays with the benefits of direct bus connections. Assuming you have a sane OS to recover with, hot-swapping should be a non-issue.

Comment: Re:Not so simple (Score 1) 575

by Deagol (#38111340) Attached to: Full Disk Encryption Hard For Law Enforcement To Crack


Boucher not only consented to a search, he unlocked the drive with the the CP on it for the border/customs agent. This is the unique part of this case that makes it pretty much irrelevant for the generic case. The court ruled (as I understand it) that because he gave up the password once, he had to do it again when asked by the court.

If he had never unlocked the drive to begin with, and kept his mouth shut, then the outcome would have been very different.

Kiss your keyboard goodbye!