lsof, and network connections.

This is a simple one, but I've not used it much before today.

You can use lsof on a linux box to find out what's connected to what over the network.

In this case, we'd implemented a new ldap server, and it's address had changed, I was attempting to determine what was still connecting to the old ldap server on a given linux system.

Netstat showed:

HTC Incredible, Root, and Custom Roms

I have an HTC Incredible, bought it a few months ago, and shortly thereafter rooted it.

I used the Unrevoked one-click root tool.  Just plug in your HTC droid via USB, set it to Sync mode, and fire up the app.  It'll install ClockworkMod Recovery, and sets S-OFF, and enables superuser access.  You can then install root apps, like wireles tethering, Titanium backup, and a number of other things.  One great thing that Clockwork gives you, is the ability to run NAND backups of your current running ROM, and the ability to install other ROMS.  Which is perfect!

To The Cloud! Maybe not the best solution.

"The Cloud" or "Cloud Computing" are some of the latest buzz words in the industry.  The definition of either of these terms is... well.. cloudy.  The basic idea is that your applications are virtualized across a global network of hypervisors.  Not too dis-similar from the VM Clusters run at the institution that I work at, just on a much larger scale.

Mounting xen disk images.

I run a Xen vm system which in turn hosts all of my linux servers. Recently, I had reason to mount the disk image from one of the vm's on the xen host.

I've found little documentation on this, so I thought i'd post what I ended up doing.

First, make sure the vm is down. Then you can mount it's disk image.

I used kpartx to mount the image as a loop.

RHEL 5.5 KVM Guest memory ballooning

We've started to look into memory ballooning on RHEL and KVM.  I thought I'd document some of my findings here.

The concept is simple.  You have your RHEL host, running KVM, that host runs a number of virtual machine guests.  The guests can be anything that runs on the chip archetecture that you're emulating.  In my case, x86_64 and i386.  We run some Windows guests, and mostly RHEL.  In my testing, i'm using a RHEL guest.  I'll test this on Windows at some point, and see what happens. 

Dismantling a desk drawer lock with a paper clip.

I found myself at work the other day, without my keys. Luckily our offices share the same key, so a co-worker was able to get me into my office. Not so my desk though. I don't keep anything terribly sensitive in my desk, because i've always felt the lock was a tad on the cheap side. Though i've attempted to pick it in the past with no success.

Today i really wanted to get at a sheet that I had in my desk drawer. So i thought I'd give it another shot. I'm no locksmith. Nor am I a pro at picking locks, but I've had luck in the past with this paper clip that i keep in my wallet, and a small pocket knife that i have in my pocket all the time. I take the screwdriver/file on the knife, and use it to put pressure on the tumbler, and then rake the pins in the lock, to try to get the tumbler to turn. This has worked on low grade locks in the past. I used to use this method to unlock the hdd write locks in college so i could install Netscape on the IE only computers in class. Today I set about picking the lock using my old method, and discovered a new method... I've seen locksmiths re-key locks in the past. They used a specialized tool, and just pulled the whole tumbler out, and replaced it with another one keyed differently but i never really knew how they got the old tumbler out. Well, today I found out. I, quite accidentally i might add, pulled out the entire tumbler in my desk lock using my paper clip. After I'd done this, i was determined to figure out HOW i did it. A spare key for my desk, which was IN the locked desk drawer, helped me shed light on this. It also gave me a very good look at how locks work in general. I'd already had a basic knowledge, but this allowed me to solidify it. Basically, there are 6 pins. Well when you put your key in, it contacts 5 of these, and moves them into just the right position that the tumbler is allowed to spin. The tumbler is then attached to some other mechanism which actually unlocks the drawers. The 6th pin, is there solely to hold the tumbler in! I was able to hit the 6th pin, and unlock the tumbler. At that point, the whole tumbler came out in my hand regardless of the presence, or lack thereof, of the key. I was then able to use my pocket knife to turn the mechanism which unlocked the drawers.

A friend called me MacGuyver for figuring this out, which prompted an earlier blog post. It does sound rather funny when you think about it, i defeated the "Security" on my desk with a straightened paper clip... Needless to say, I have even less faith in this desk lock now, and i'll be even less likely to put anything of value in it.

From the Deep

"Here we are again, on this rust-bucket of a boat." thought James, as he looked around at the poorly supplied vessel he found himself on. Hardly any ammunition, a single torpedo, practically defenceless. "It's a good thing I've got Wren to look out for me...". James, and two other mercenaries were contracted by a ships captain that they've worked with in the past, to investigate a distress call that was received from one of the oil rigs still in operation off of the gulf coast. They were en-route.

Pages