Well, it looks as if I might be moving back to North Carolina next summer…
After all the commercials on how Windows 7 won’t have any problems, like their previous releases, I was surprised to read how people were having problems with the installation of Windows 7.
I’m awaiting a proclamation to be delivered henceforth by a knight on his trusted steed that will proclaim to all that I am the ISSA of all the land.
Good golly I hope that made sense. Maybe it was funnier when my Information System Security Officer (ISSO) said it in a meeting late last week. Anyway, I’ve been knighted his assistant (ISSA) for all security matters dealing with my project (since he really doesn’t have visibility into my project…). I guess it’s about time I get serious about getting my RHCE since 95% of my servers run RHEL 5.x. But until then I’ll be stepping up my efforts now that I have developers and admins asking me questions about everything. At least it will keep my security knowledge sharp!
Zikula Polls has now been packaged, approved, and is in the wild.
Just pushed zikula-module-advanced_polls to bodhi tonight. This module, as you might have guessed, allows the user of the Zikula CMS to also do “advanced” voting. There is also a simple polls package that hopefully will be in CVS tomorrow night. Sorry but I don’t know the difference between simple and advanced. But you can check out the advanced tonight if you like!
You can find the F-11, F-12, and EL-5 package on bodhi. Please login and leave karma. 3 pushes it to stable!
A discussion was had on one of the Fedora IRC channels months ago about the “proper” way to handle expiring GPG keys without breaking the web of trust. It was my opinion that by generating new keys every so often (yearly?) that it would increase the security of the overall system because keys can be cracked and the longer the key is in the wild the higher the chances of the key being exposed. You may not even know that they key has been cracked or being used.
Today I went searching for answers and found them in a keysigning HOWTO. The HOWTO explains, what I would consider to be, a valid reason to regenerate your keys along with a proper method for not necessarily breaking the web of trust.
So my I just got word that my current method of authenticating into the network where I do all my work will be changing. We used to use a Vasco token to gain access to the network and I had figured out how to make that work but now we will be authenticating using our smart cards. I looked at the current Cisco VPN setup in Network Manager but it doesn’t appear to support smart cards. Does anyone know how to make this happen?