Ever been hacked? Had information stolen? Who do you turn to? What do you do? No matter what the level, a security breech has occurred and action must be taken to ensure a repeat offense doesn’t happen. The first reaction to a security breech is to isolate it and fix it as soon as possible. However, writing to the systems in any way can cause clues to be overwritten. Therefore it is important to discover the identity of the attacker. The more quickly that forensic analysis is performed the more likely that the attacker, vandal or thief will be apprehended. One of the best places to start in analysis is…
-
-
Symbolic Link vs Alias
A symbolic link is *not* an alias. A symlink (symbolic link) is in the filesystem so all of the layers of the OS can use symlinks. This includes Carbon, Cocoa, Java, and BSD apps. Alias files are Finder-specific concept. Aliases are not used by the rest of the system. Only the Finder deals with aliases. At the Finder level, aliases and symlinks are similar, but symlinks are far more versatile and used in pretty much every flavor of *nix.
-
Xsan: Storage Pools
Earlier, we described a LUN. In Xsan you can take multiple LUNs and stream data to them in a round-robin fashion. When doing so you will group them together in what Xsan calls Storage Pools. Each Storage Pool has a maximum throughput of about 4 LUNs worth of storage. Each of the LUNs (in Xsan 1.0) has a maximum of about 2TB in capacity. Therefore each Storage Pool can typically net you around 4gbps of speed and about 8TB in capacity. You can then lump multiple Storage Pools into a given Volume to obtain volume sizes of 32, 40, 48, etc. TB. However, when you do so you will not…
-
Link Aggregation and Tiger
I originally posted this at http://www.318.com/TechJournal Mac OS X 10.4 includes support for link aggregate networking. Link aggregate networking shares network traffic over two or more bonded Ethernet controllers, giving them one IP address for communication. This can allow the servers controllers to run at speeds of 2Gbps. Link aggregation is configured using the Network System Preference Pane. To enable Link Aggregate Networking 1. Open the Network Pane from System Preferences 2. Click the Show: box and select Network Port Configurations 3. Click New 4. In the Name: box enter a name for the new aggregate port 5. In the Port: box select Link Aggregate 6. Places check marks in…
-
ITIL
To quote wikipedia: http://en.wikipedia.org/wiki/Information_Technology_Infrastructure_Library The Information Technology Infrastructure Library (ITIL) is a set of concepts and policies for managing the Information Technology (IT) services (ITSM), developments and operations.
-
On the Road: Albuquerque
Is it me or are people here a little strange. On the outside they seem like loners that want to keep to themselves but then there’s a strange dichotomy where they also seem likely to wear a crystal around their neck and build houses out of recycled tires. Cool town, if a bit desolate.