/IronSysadmin/episode_2_-_you_got_your_dev_in_my_ops


/IronSysadmin/episode_1_-_intros_and_moving_to_the_cloud

Intros
  Who the heck are we, and why are we doing a podcast?
  Why the name "Iron Sysadmin"?
  What can people expect here?


~/blog/how_to_break_40_years_of_resiliency

So back in the late 60's, "The Internet" was in its infancy, several groups of technologists at various institutions were running a network called ARPANET.  ARPANET eventually evolved into what we call the internet today.  Systems connected to ARPANET, and todays Internet are each assigned an IP address, which is how other systems on the network communicate with it.  Your computer has one, your phone has one, your fridge might have one, the web server I run that you're reading this blog on has one.  Some have several.  The problem with IP


~/blog/lets_encrypt_nginx_proxy_centos_7

I've been interested in the Lets Encrypt project since I first heard about it, quite some time ago. It's a cool idea, automatic free certificates for everyone!  I've been using startcom for the majority of my personal sites, minus swbcrawler, which I purchased a cheap commercial cert for.  A few months back, Lets Encrypt finally opened up for publi use, and I giave it a little poke.  I didn't end up putting any of its certs live at the time though.


~/blog/hack_my_derby

In 2011, Dave Kennedy and his crew started a little conference, called DerbyCon.  Named for its location, in Louisville, KY, it's an awesome infosec con, with a great atmosphere.  Because of the name, derby hats have been a staple. Much of the staff wear them, and many attendees also wear them.  Many of them are modified, lights, displays, whatever.  This eventually lead to a contest, in 2014 attendees were able to enter their modified derbies in the "Hack Your Derby" contest.


~/blog/nfc_ring

Yesterday, I received my long-awaited NFC ring in the mail.  And it is awesome.  Well, as awesome as you can expect it to be anyway.  I had backed them on kickstarter about a year ago, and now that they've worked through their issues, rings are coming to those who backed.  Its neat technology, and it's got some interesting uses.  At the moment all I'm using it for is unlocking my phone. 


~/blog/awesome_times

So, years ago, I was working Technical Support for an ISP. This was late 90's, early 2000's. I was just out of business school, with a fresh Associates degree in PC Networking under my belt. At the time, computing was at what I perceived as sort of a standstill. Yea, things were progressing, but it was all just redoing the same thing better. Memory was getting cheaper every year, CPU's were getting faster, storage more affordable, OS's were being udated to newer better features, but it was all just the same muck. My 486 was replaced with a Pentium 3.


~/blog/puppet_26_filebucket_permissions

Just a little snippet. I'm working with puppet, and foreman. Im working through the Pro Puppet book from APress. In the first section, they have me create a sudo module, which will pull /etc/sudoers from a puppet file bucket, and put it in place on the agent. I was running into the following error.


~/blog/need_help_finding_a_lost_hiker_-_california_sierra_nevada_mountains

The brother of a high-school friend of my wife's, is missing. He was on a camping/hiking trip in the Sierra Nevada Mountains, in the Mammoth Lake area. He was separated from his friends when his car broke down, and never met back up with them as planned. The hunch is that he went on a hike on his own while waiting for his car repair.

He's been missing for almost a month. It doesn't look good.


~/blog/sysadmin_appreciation_day

Fifteen years ago, I knew a teenager, who spent his evenings hacking away on his Gateway 2000 486, and his days trying to work his way around the security put in place to prevent him and his fellow students from accessing data they shouldn't. Never malicious, just curious, and thirsty for control of something.


Pages