Way back in 2003, I bought a ThinkPad T30. Yesterday, July 10 2017, I turned it off for probably the last time.
A few people in the Ubuntu forums have of late been complaining about things they don’t like. Harsh words have been used. When someone referred to GRUB2 as “crap”, I found myself inspired to write a rant, reminding people that they don’t know how lucky they are. It is reproduced, lightly edited, below…
A network operators’ mailing list I am on has just gone through yet another multi-day discussion of how to comply with Microsoft licensing. No-one understands it. I don’t think Microsoft itself understands it. What finally compelled me to write this rant was this quote from some Microsoft document or other: Continue reading
Just read this article on the ABC website, about securing your enterprise against malware. They gave great advice – “detect and block at the perimeter and inside the network”, “assess and protect endpoints”, “analyse threats through context”, “eradicate malware and prevent reinfection”, “remediate attacks with retrospective security” and “be sure to implement integrated rules on the perimeter security gateway”. But one important bit of advice was missing.
In a previous article, I discussed how IPv6 source address selection worked. Normally it all Just Works, but there are several situations where you may want or need to control the address selection process. In this article, we’ll look at why you might want to control source address selection, and how you can do it.
Source address selection must be very irritated; destination address selection gets all the press coverage.
This article will start to redress the balance, by talking about what source address selection is, why it is needed, and how it works. If you want the nitty-gritty, check out RFC 6724 (which obsoletes RFC 3484).