Data Remanence, n.
The residual representation of data that remains even after attempts have been made to remove or erase the data.
It’s a well-known fact that simply deleting a file on your computer doesn’t actually delete the data that was in it from your hard disk; in fact it’s rather trivial to use software that can automatically discover and reconstruct often a surprising amount of data you’d long ago deleted. To really remove that data from a disk (e.g. to safely discard, sell, or otherwise give it away), you have to go a step further and wipe it away.
It’s only a slightly lesser known fact that to properly wipe a file from your hard drive, you have to use software that overwrites it numerous times; popular methods today include the Schneier 7-Pass, NIST, DoD, and, perhaps most famously, the Gutmann 35-Pass Method, with most modern software implementing at least a few of these different methods.
But with multiple passes comes increased time, and with increased time comes a decrease in people’s willingness to do it. So it’s worth exploring a critical question, namely: Is it really worth it?
The answer is, perhaps surprisingly, “No.” Continue reading
RAM is fast. Very fast. Very, very fast. If you were to think of your hard drive as a Ferrari, your RAM would be a tachyon — a theoretical particle that moves faster than the speed of light!
That’s great, but what does it have to do with Minecraft? Well, everything, actually!
Minecraft sees a lot of hard disk I/O, especially if the players on your server like to wander or explore. But we already know that your hard disk is slow. Wouldn’t it be great if we could upgrade from that slow little Ferrari and instead ride the tachyon?
Well, you can! Continue reading
Linode is a great provider of Linux-based VPS — this site is running from one right now, in fact! To help support it, and for a tad of extra security, I also use the free CloudFlare service, which provides a security-centric CDN aimed at protecting your site from bots.
Both of these services have their own included DNS managers. And both provide an API that lets you manipulate those DNS records programmatically.
This brief post will show you how to leverage these services to quickly and easily roll your own dynamic DNS service. Continue reading
A bizarre issue solved today:
On one server, we’re running two (named) instances of Microsoft SQL Server 2008. The first one, using the default instance name, runs just fine with no problems. The second one, however, had a bizarre issue: The first time any application tried to connect, it would simply time out, but if you re-tried without closing or restarting that application, it would immediately connect successfully!
What could possibly cause that sort of intermittent error? Continue reading
There’s certainly no shortage of sites offering quick instructions to move your SVN repository from one server to another. About 3.3 million (at the time of this writing) of them, it seems. So why do I have to make it 3.3 million and 1?
Because they all seem to leave off an important step: What to do on the client side after you’ve moved the repository on the server side. Continue reading
It’s today. And while this blog is by no means a major player on the internet stage, it is nonetheless on native IPv6, thanks to Linode.com, my host.
So, are you on IPv6 yet? Will you be ready when it comes time to finally make the switch?
Posted in Tech
Linode.com has recently added native IPv6 support to many of its data centers. Linode hosts the VPS that runs this blog, and it happens to reside in their Dallas data center. I was busy planning my wedding when IPv6 support reached me here, so I only got around to enabling it this week.
So now this blog is available over both IPv4 and IPv6, with a special IPv6-only version running at ipv6.kromey.us. It took a bit of doing, and a lot of trial-and-error, so let me save you some time by sharing how I succeeded. Continue reading
This is quite dated now, but I just now stumbled upon the announcement of the breach of the Apache Software Foundation’s servers last April. While certainly an unfortunate event that could have been limited or even prevented by proper (and properly enforced) security procedures, their post-incident report should be a model to all for disclosure of such breaches, especially the inclusion of the details of how access was obtained, complete with candid admissions of where their own policies and security were lax enough to allow the attackers to gain further access.
It’s unfortunate that it happened, but I commend the ASF for their openness and transparency following the breach.
Creating a resource mailbox in Exchange Server is easy. And it can make managing your organization’s resources — conference rooms, projectors, etc. — real easy, especially in avoiding double-booking.
But what if you accidentally create your resource mailbox as a user, instead? You can’t set it to auto-accept invitations, creating a management nightmare as each one has to be manually accepted on your resource’s calendar.
You can change the type of the account, but no one — Microsoft included — makes it easy to find out how! Here’s my humble effort to change that… Continue reading
Microsoft’s Virtual Machine Manager, or VMM, is a slick piece of tech that smoothly enables users to control virtual machines spread out across multiple hosts, including, of course, localhost.
But what happens when VMM reports “Host not responding”, even for localhost? Continue reading