|
I’ve previously blogged about the productive length of questions at lectures [1]. But it seems to me that worthless questions can be recognised before the person asking even gets properly started. Here is a list of ways of recognising them:
Appeal to authority. If someone tells you about their job or other qualifications before asking […]
Here are some online psychological tests that can be used as part of an Autism Spectrum Disorder (ASD) self-diagnosis.
Simon Baron-Cohen is well known for his research into Autism, some of it is quite controversial (particularly the “Extreme Male Brain” theory which is widely rejected in the Autism community). There are some interesting tests based […]
I’ve had a couple of parents ask me for advice about children with Asperger Syndrome (AS), in one case a child who was formally diagnosed and in another case a child who is suspected of being an Aspie but who hasn’t been assessed. I don’t claim to be an expert on these things, but based […]
Here are some free books that I have downloaded and read:
Cory Doctorow’s book Eastern Standard Tribe was the first novel I read on my computer. His other novels are linked here. The novelette A Colder War by Charles Stross is really good. The novel Accelerando by Charles Stross is very well written and has […]
This table shows the power consumption of some of the computers I own. I use a domestic electricity meter that was certified for use in billing customers to measure this. Any inaccuracies in the measurement will correspond to inaccuracies in electricity bills of people who use such computers.
Before anyone asks, I am not interested […]
POP (Post Office Protocol) is the most used protocol for receiving mail from a server to a MUA (Mail User Agent) for reading. It is specified in RFC1939.
But the way it works (in most cases) is quite simple and doesn’t require reading the RFC, connect to port 110 (the standard port for POP3) and […]
The first thing to test is a TLS (aka SSL) connection. The stunnel program has special code for this, the command “stunnel -n smtp -c -r mail.example.com:25” will connect to the server via SMTP and negotiate SSL.
If you use gnutls then the command “gnutls-cli -s mail.example.com -p 25” will connect to the server, allow […]
It’s a commonly held myth that hardware RAID is unconditionally better than software RAID. That claim is not true in all cases and is particularly wrong at the low end.
Really Cheap Hardware RAID
The cheapest so-called hardware RAID uses RAID in the BIOS and relies on an OS driver for support when running in […]
Security Context is the SE Linux label for a process, file, or other resource. Each process or object that a process may access has exactly one security context. It has four main parts separated by colons: User:Role:Domain/Type:Sensitivity Label. Note that the Sensitivity Label is a compile-time option that all distributions enable nowadays.
User in terms […]
This document is designed to be a cheat-sheet for MySQL. I don’t plan to cover everything, just most things that a novice MySQL DBA is likely to need often or in a hurry.
Configuring mysqld
If you are going to provide a database service to other machines edit /etc/mysql/my.cnf and set the bind-address parameter to […]
|
|