2878
Chris's Wiki :: blog/linux/BtrfsCoreMistake
comparison between zfs and btrfs from a higher level
zfs  btrfs 
15 days ago
RPM SPEC pre/post/preun/postun argument values | Me in IT
RPM has 4 parts where (shell) scripts can be used:

%pre - Executed before installation.
%preun - Executed before un-installation.
%post - Executed after installation.
%postun - Executed after un-installation.
In all these parts or sections the variable "$1" can be checked to see what's being done:

Initial installation
Upgrade
Un-installation
This table show the values of "$1" per section related to the action:
[...]
rpm  packaging  script 
19 days ago
Let's talk about packages
Recently the Python community got to celebrate the triumphant launch of the new Python Package Index. It’s been a long time coming, and the folks who made it happen all deserve a round of applause.

PyPI is an incredibly important piece of infrastructure for the Python community, and if you use Python you probably use PyPI, directly or indirectly, on a daily basis, and many different sites, services, and companies rely heavily on it.

But: if you rely on PyPI, how often do you think about that reliance? What would you do if an incompatible version of one of your dependencies, or one of your dependencies’ dependencies, suddenly appeared? What if one of them disappeared? Would your applications or your deployments break? What would you do if PyPI had extended downtime? Would you still be able to deploy your applications? What if PyPI got hacked? If someone replaced one or more packages with malicious versions, would you be safe, or would you install the malicious packages and end up running them on your servers?

The people who run PyPI are smart and conscientious and do what they can to keep it running 24/7 and not hacked, but these are still serious questions you should be thinking about. The people who run PyPI certainly are thinking about some of the scarier cases, and working on ways to make them less scary, but there are also things you can do.

So let’s talk a bit about that.
deployment  python  packaging 
5 weeks ago
A Homomorphic Encryption Illustrated Primer
Homomorphic encryption schemes provide an amazing capability - to be able to perform calculations on data without knowing what the data is. This lets you work out the answer to questions while keeping potentially sensitive source data private.
[...]
encryption 
5 weeks ago
Jenkins as a Sysadmin tool
(aka “launching ansible automatically”)
ansible  automation  jenkins 
6 weeks ago
Containers Patterns
compares patterns how to create containers
docker  container 
february 2018
« earlier      
accessibility ajax analysis ansible apache apps archlinux art aws backup bash bgp bind blog boot browser bsd business cache cheatsheet cisco cli cluster color comparison config console container couchdb cracking creativecommons crypt cryptography css css3 culture database datenschutz debian debug debugging design desktop development devops diy django dns docker documentation ebook education email encryption exploit ext3 fail faq filesystem filetype:jpg filetype:pdf fink.weitergeben firefox firewall font fonts forms framework free freebsd fuckup fun geek gesellschaft git google gpg graphics graphite gui guide hack hacking hacks hardware hash howto html html5 http humor icon icons image inspiration interface internet intro ip iptables ipv6 jabber javascript jquery kernel kotzen kubernetes latex learning lesbar license linux list logging maemo mail management media media:document media:image monitoring music musik mysql n810 netlabel network networking news nginx opensource optimization p2p password pdf pentest performance photography php plugin plugins politics politik presentation privacy productivity programming proxy psychology python recht reference regex resources rl router routing ruby satire scalability scripting security server shell sicherheit slides software spam sql ssh ssl statistics storage streaming svn sysadmin system tcp template terminal test testing tex theme tips tls todo tool tools toread tuning tutorial tweak typographie typography umgang unicode unix usability video vim virtualization vista visualization vmware vpn wallpaper web webdesign webdev wifi wiki windows wireless wordpress work workflow xhtml xmpp zeitgeschehen zensur zfs Überwachung überwachung

Copy this bookmark:



description:


tags: