Categories

Donate

Advert

Worthless Questions at Lectures

I’ve previously blogged about the productive length of questions at lectures [1]. But it seems to me that worthless questions can be recognised before the person asking even gets properly started. Here is a list of ways of recognising them:

Appeal to authority. If someone tells you about their job or other qualifications before asking […]

ASD Self-Diagnosis Tests

Here are some online psychological tests that can be used as part of an Autism Spectrum Disorder (ASD) self-diagnosis.

Simon Baron-Cohen is well known for his research into Autism, some of it is quite controversial (particularly the “Extreme Male Brain” theory which is widely rejected in the Autism community). There are some interesting tests based […]

Some Suggestions for Parents of Aspies

I’ve had a couple of parents ask me for advice about children with Asperger Syndrome (AS), in one case a child who was formally diagnosed and in another case a child who is suspected of being an Aspie but who hasn’t been assessed. I don’t claim to be an expert on these things, but based […]

Free Books

Here are some free books that I have downloaded and read:

Cory Doctorow’s book Eastern Standard Tribe was the first novel I read on my computer. His other novels are linked here. The novelette A Colder War by Charles Stross is really good. The novel Accelerando by Charles Stross is very well written and has […]

Computer Power Use

This table shows the power consumption of some of the computers I own. I use a domestic electricity meter that was certified for use in billing customers to measure this. Any inaccuracies in the measurement will correspond to inaccuracies in electricity bills of people who use such computers.

Before anyone asks, I am not interested […]

How to Debug POP

POP (Post Office Protocol) is the most used protocol for receiving mail from a server to a MUA (Mail User Agent) for reading. It is specified in RFC1939.

But the way it works (in most cases) is quite simple and doesn’t require reading the RFC, connect to port 110 (the standard port for POP3) and […]

How to Debug SMTP with TLS(SSL) and AUTH

The first thing to test is a TLS (aka SSL) connection. The stunnel program has special code for this, the command “stunnel -n smtp -c -r mail.example.com:25” will connect to the server via SMTP and negotiate SSL.

If you use gnutls then the command “gnutls-cli -s mail.example.com -p 25” will connect to the server, allow […]

Software vs Hardware RAID

It’s a commonly held myth that hardware RAID is unconditionally better than software RAID. That claim is not true in all cases and is particularly wrong at the low end.

Really Cheap Hardware RAID

The cheapest so-called hardware RAID uses RAID in the BIOS and relies on an OS driver for support when running in […]

SE Linux Terminology

Security Context is the SE Linux label for a process, file, or other resource. Each process or object that a process may access has exactly one security context. It has four main parts separated by colons: User:Role:Domain/Type:Sensitivity Label. Note that the Sensitivity Label is a compile-time option that all distributions enable nowadays.

User in terms […]

MySQL Cheat Sheet

This document is designed to be a cheat-sheet for MySQL. I don’t plan to cover everything, just most things that a novice MySQL DBA is likely to need often or in a hurry.

Configuring mysqld

If you are going to provide a database service to other machines edit /etc/mysql/my.cnf and set the bind-address parameter to […]