Any sufficiently advanced technology is indistinguishable from magic.

Archive for the 'IT Administration' Category

Effects of Explosions on Schedule Goals

May 7th, 2007 Posted in IT Administration, Team Management | 1 Comment »

The completion of a task was scheduled for 3:30pm. We have been pretty good at estimating the time that tasks require, and we have exercised practices that helped ensure that we meet our schedule predictions. We were fairly confident that we were going to complete our task at the desired time, until the lights flickered […]

Securing SSH Connections

April 26th, 2007 Posted in IT Administration, Security | Comments »

Sure, traffic between an SSH client and server is enciphered, but how can certainty that the correct server is directly processing client requests be enhanced. A man in the middle attack occurs when an SSH server poses as the desired host, and forwards messages between the desired host and the client. The fake SSH server […]

From EFnet #gamedev

April 19th, 2007 Posted in IT Administration, Software Engineering | Comments »

[00:16]* Aeplus ( has joined #gamedev [00:34] <Decept404> anyone know of any decent offline/local network issue/bug tracking solutions? [01:05] <Aeplus> how about bugzilla? [01:11] <Decept404> not offline ;P [01:12] <Aeplus> heh, you can always install a webserver and db server for use on the local host =) [01:12] <Aeplus> … and it has the added […]

The Move to CentOS

April 15th, 2007 Posted in IT Administration | Comments »

I decided to make the move this weekend. Witnessing Kelly adopt GNU/Linux after being a long-time user of Microsoft solutions inspired me to transition away from Microsoft Windows. So, I bought an open-box 500GB Seagate FreeAgent external hard drive from Fry’s Electronics for 140USD, moved all my data files from my Windows desktop, and converted […]

Chrooting SSH/SFTP

March 12th, 2007 Posted in IT Administration, Linux / Unix | Comments »

Brandon Hutchinson provides a concise howto for chrooting SSH. For recent distributions of Red Hat Enterprise Linux (like CentOS), the following may also be needed in addition to Hutchinson’s Fedora Core procedures: cp /lib/ /chrootedpath/lib/. chmod 666 /chrootedpath/dev/null /chrootedpath/dev/zero Running ldd on the sshd binary executable will display the executable’s shared library dependencies. The first […]