Author Archives: Jim

MDRAID Common Commands

      Comments Off on MDRAID Common Commands

MDRAID Common Commands Creating an array Then you need to create a configuration file mdadm.conf And write the changes to the boot image: Work with array Mark a disk as… Read more »

zmblobchk and unexpected blob error messages

      Comments Off on zmblobchk and unexpected blob error messages

What to do if you receive an unexpected blob after performing a zmbobchk check? This means that the message with id 58276 has no corresponding mysql entry with meta data…. Read more »

Trusted News Sources

      Comments Off on Trusted News Sources

Source: fake-news-initiatives-fact-checking To name a few: The Trust Project, which is made up of dozens of global news companies, announced this morning that the number of journalism organizations using the global… Read more »

Key Size in Crytpography

      Comments Off on Key Size in Crytpography

Key Size in Cryptography Simplified Cryptography Primer In asymmetric or public-key encryption there are two main parts: Encryption Algorithm (RSA, ECC, …) Cryptographic key pair The two keys of the… Read more »

Crypto Jargon

      Comments Off on Crypto Jargon

Crypto Jargon Hash Functions A hash function is a completely public algorithm (no key in that) which mashes bit together in a way which is truly infeasible to untangle: anybody… Read more »

Security Pages that Count

      Comments Off on Security Pages that Count

Security Pages that Count With so many sites that offer helpful security information, this is my start of the must read sites. Latest Reports ThreatPost – latest news of exploits… Read more »