Check out my Profile

Blog

Cryptography Lessons

Simple explanations of how crypto works. The ever-excellent Khan Academy has produced a very nice and short series of videos explaining how cryptography works. Anyone who understands basic high...

By Tracy r reed |
I don't like Dell

Here are many reasons why I don't like Dell. Why I hate Dell servers: Every Dell machine which my clients have purchased and paid big money for has caused problems. I'm not very happy with my Dell...

By Tracy r reed |
Mechanical Keyboards

You owe it to yourself to try one... When you are a professional or use a particular tool constantly every day you inevitably become somewhat of an afficionado or at least rather particular about...

By Tracy r reed |
PA-23 Piper Aztec checkout

Last week I got checked out in the Piper Aztec. We shot some video of the flight. You can check it out here.

By Tracy r reed |
The old "because it's the most popular" myth

Linux is a very tempting target for spammers and botnet owners. And there are millions of Linux boxes out there by now. But so far the only way they are really being compromised is through PHP web...

By Tracy r reed |
Federal Linux Security Resources/checklists

I often say that most successful attacks and vulnerabilities are failures of imagination (when they aren't outright laziness/penny pinching). The authors of these documents have seen a lot of...

By Tracy r reed |
Verisign intrusion

Note that the Verisign CA business was sold to Symantec a couple of years ago (about when the attack happened) but it still operates under the Verisign brand. So who knows if the compromise is...

By Tracy r reed |
Change and HTML emails

I write a lot of lengthy emails, reports, and other documents and all too often forget to post them here for others to enjoy (or ignore or despise, whatever). I know IT people who are staunchly...

By Tracy r reed |
SIP brute force attacks

If you run a VOIP system accessible to the Internet you need to keep up on your system security. Over the last year I have seen an ever increasing amount of brute force attacks on SIP servers....

By Tracy r reed |
You cannot rely on antivirus

As the number of viruses/malware to scan for and parts of the system to monitor for infection increases more resources will be required. I bet we already spend the equivalent of one whole CPU of...

By Tracy r reed |
Windows market share

It is debateable whether Linux is increasing in desktop market share or not although it is killing (in the form of Android, for whatever that's worth) in the mobile phone business. I think Linux...

By Tracy r reed |
Aeronautical charts

The special aeronautical charts (aka maps) used by pilots have expiration dates. Dates vary between every 56 days to every two years depending on the chart. Mountains don't generally change much...

By Tracy r reed |
Flight to Catalina Island (KAVX)

On March 21st, 2009 (Yes, I'm a little behind in my blog entries!) I flew my wife and three of her friends to Catalina Island in Plus One's Cessna 210 N210BX. Catalina Island is one of the...

By Tracy r reed |
RedHat Security

This sort of thing is why I feel very good about selling and supporting RedHat Linux. You won't find any other OS vendor offering an honest look at the security of their software or producing such...

By Tracy r reed |
Assaulted for promoting freedom

More and more this is what freedom is about in the modern age...I have a bumper sticker on my car.Update: I guess I should be worried! Robert Donovan emailed

By Tracy r reed |