Tuesday, February 27, 2007

slang

It is reported that a theater in Florida has changed the name of The Vagina Monologues to The Hoo-Haa Monologues after a complaint.

How does a medical term become so offensive? Is Hoo-Haa less offensive than other terms such as Beaver?

The Vagina Monologues is old news anyway. The idea was surprising when it was new, but that was a while ago. Anyone who wants to complain has really missed their chance.

Wikisaurus has a collection of synonyms for vagina, maybe a better name than Hoo-Haa could be found?

Thursday, February 15, 2007

a good dog for uplifting

The Norwegian Puffin Dog has six toes that are all fully formed. This has to be a good start for the uplift process.

The requirements for uplift are intelligence, speech, and the ability to use tools (dexterity in fingers). It seems that the Puffin Dog has a finger advantage over other breeds. Also the Lundehund has the ability to spread it's front legs out horizontally and to turn it's head around to face backwards, both these abilities significantly increase it's potential ability at using tools (uplifted dogs could use their mouths to manipulate tools as well as their hands).

So we need to find a breed that has good vocal capabilities and a breed that is intelligent and produce a cross-breed that has the best of all three!

Lundehund Syndrome sounds nasty, and would be almost impossible to breed out of pure bred dogs, but when producing a cross-breed it should be easy enough to do. Given that we don't care whether the uplifted dogs look like Lundehund's, have the same number of teeth, or are identifiable with that breed in any way other than dexterity it should be easy to breed out the genetic damage.

Monday, February 12, 2007

xen sucks

According to Debian bug #399113 and linked discussion it is impossible to run a stable system on Xen without enabling PAE. It seems that no-one is considering the fact that a hypervisor that runs on both 32bit and 64bit architectures should be able to support 32bit systems with <4G of RAM (IE not using the PAE feature).

But instead to work around this bug the Debian developers have decided to just enable PAE. This is annoying for me as I have to either buy a new laptop or reduce my use of Xen.

I wonder what will happen if a Xen bug is discovered that only happens on PAE systems? Would that make Xen only an AMD64 thing?

John Howard is bizarre

Our despicable prime minister said "I think that would just encourage those who wanted completely to destabilise and destroy Iraq, and create chaos and victory for the terrorists to hang on and hope for (an) Obama victory".

That statement is wrong in many ways, firstly the US (with Australian help) has destabilised and destroyed Iraq already. Claiming that removing US troops at this stage will do any further harm is unproven (and except for the Kurdish area extremely unlikely). Trying to link a presidential candidate with a terrorist organisation is the worst type of dirty politics.

Texas Republican senator John Cornyn requested that the Australian government stay out of US politics. It sounds like a reasonable request. But I wonder whether John Cornyn got involved when the US ambassador spoke out against the leader of the Labor party at the last Australian Federal election...

Senator Obama suggested that if John Howard wants to criticise his policies in Iraq then he should first send another 20,000 Australian troops (there are currently 140,000 US troops compared to 1,400 Australians). According to the CIA World Fact Book Australia has a population of 20.3M while the US has a population of 298.4M. If the ratio of serving soldiers was to match the populations then Australia would have 9,500 troops in Iraq. If Australia was to be a full military partner of the US (but scaled down due to the smaller population) and therefore had troops in South Korea, Japan, and Germany then the number of Australian troops committed might be closer to the 20,000 number cited.

But this is no criticism of Senator Obama. For a number that was made up to demonstrate his point that Australia is not pulling it's weight in Iraq it's a quite reasonable estimate.

The US Democrat Senator Ron Wyden correctly described Howard's comment as "bizarre". This may become a catch-phrase for the Howard regime (as the Bush regime is described as a "miserable failure").

Johnny seems to think that it's in his best interests to send Australians to fight a war that has no benefit for Australia (or the US for that matter), but he doesn't have the guts to do it properly. Fortunately for him the Bush regime understands his position and allows him to send a token force to demonstrate support without the risk of any significant number of casualties or having to conscript soldiers.

This mutual meddling in elections is a demonstration of the way Bush and Howard conspire against the interests of the Australian and US citizens. Both countries need governments that look after the interests of their citizens at home and let the UN take a larger role in world issues.

Sunday, February 11, 2007

names

Wouter wrote an interesting post about names. I wonder how many people know me as Russell SELinux...

Saturday, February 10, 2007

execmod

Ulrich Drepper has written a good web page about text relocation which is most often noticed as execmod failures reported when running SE Linux. When an AVC message reports a failure of execmod against a shared object it means that the object has text relocations (the shared object code writes to code that it executes to fix up addresses). This is due to being compiled without -fPIC or -fpic.

The command eu-findtextrel (from the elfutils package) when run with a parameter of the shared object in question will tell you which functions were compiled without -fpic or -fPIC.

The module in question must be recompiled with -fpic or -fPIC to generate the correct code.

Without SE Linux it's still a bug to compile a shared object without position independent code, so any shared object which can't run under SE Linux because of execmod will probably have problems in other situations anyway (maybe only on certain architectures).

Friday, February 09, 2007

xen and yoyo

One of the benefits of Xen is that it allows a machine to be easily rebooted. Remote console and remote power management technologies are either expensive or implemented on the motherboards of expensive machines. With Xen the virtual machines can be managed without such expense and also with less effort.

This raises immediate possibilities for training sys-admins. One problem with training system administrators is that they need to have servers to administer and the mentor needs to be able to easily access them and fix them when they become unbootable. Xen makes these problems easy to solve on cheap hardware.

Monash University has for many years had a machine named Yoyo which is used for training sys-admins. It's not expected to be up as much as machines that are run by experienced sys-admins (hence the name) but I expect it would still have better uptime than a lot of corporate servers.

Unfortunately until recently there were no options available to people who weren't Monash students for learning about system administration. To solve this I want to run some sys-admin training with a server.

My plan is to set up a machine running Xen at a server room and provide a basic Debian install in a domU. I will then give the root password to a small group of trustworthy people (who I have known for some time or who are local and can be verified) and start the training. My plan is to set up a mailing list for emergency communication on one of my servers and have the trainees set one up for regular use on the domU. I will provide DNS secondary service and have an NS record for yoyo.coker.com.au point at the machine in question so the first task for them would be to run a DNS server.

I won't have unlimited bandwidth so I will track the bandwidth use from the dom0, and I will use the dom0 to make backups of the system via LVM snapshots.

The terms of service etc will be mostly copied from the Monash machine.

Please let me know if you have any suggestions for how to run this.

Hopefully this will work out and other people will want to do the same. If you run such a machine then please add a comment to this post with the URL for information on it.

Sunday, February 04, 2007

phone spam

Recently I had someone call my mobile phone asking whether I wanted to change phone providers. I asked them if they could hold the line - then I put my phone down and went back to work.

It took over eight minutes before they hung up on me.

Next time someone phone-spams you try to beat that record, please post a comment on this blog entry if you can beat eight minutes and twenty seconds of dead-air.

The call might have lasted longer if I had periodically picked up the phone and said "I'm almost ready". It's something I may test in the future.

Friday, February 02, 2007

classic security mistake

One of the most obvious (and yet most common) computer security mistakes is to take input from an untrusted (and potentially hostile) source. A classic example of this is in Windows Vista where audio output from the system speakers can be taken as input to the speech recognition system. According to the BBC article an MS representative said "it would be unlikely the user would not be in the room to hear the file with malicious instructions being played".

It seems that according to MS it's OK for your computer security to be breached, just as long as you are around to witness it!