-
Recent Posts
- Case Study: Incorporating Disruptive Technologies into Existing Products (part 3)
- Case Study: Incorporating Disruptive Technologies into Existing Products (part 2)
- Case Study: Incorporating Disruptive Technologies into Existing Products (part 1)
- Incorporating Disruptive Technologies into Existing Products
- Investing in Disruptive Technologies
Articles
Major articles in chronological order:
Archives
- May 2020
- April 2020
- March 2020
- February 2020
- December 2019
- November 2019
- October 2017
- August 2017
- July 2017
- November 2016
- July 2016
- June 2016
- August 2015
- July 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
Categories
Author Archives: Russell Doty
Threats: William the Manager
In our last post we looked at the threats a security czar can create. Let’s now look at another surprising threat: William is concerned with his group getting their job done. He is under budget pressure, time pressure, and requirements … Continue reading
Posted in Security
2 Comments
Threats: Stan the Security Czar
Our previous posts looked at the stereotypical threat of hackers. Let’s now look at some less obvious threats: What?!? The security guy is listed as a threat to system security? Absolutely. Stan is knowledgeable. He knows that the world is … Continue reading
Posted in Security
Leave a comment
Is there a Java Binding for LMIShell?
An interesting question just came up: “is there a Java binding for LMIShell?” Hmm, good question – let’s answer it by digging into the OpenLMI architecture a bit. LMIShell is a client framework written in Python. It consists of a … Continue reading
Posted in System Management
Leave a comment
Threats: Sphinx the Script Kiddie
Our previous post considered skilled hackers – but not all hackers are skilled… Sphinx the Script Kiddie Unlike Igor, Sphinx doesn’t have deep skills or knowledge. But he does have access to very powerful cracking toolkits that other people have … Continue reading
Posted in Security
Leave a comment
LMIShell on RHEL 7
Someone reported that they were having problems using LMIShell on a RHEL 7 system – they didn’t have any of the friendly commands that we have been talking about. And they were right; the full set of LMIShell scripts that … Continue reading
Posted in System Management
Leave a comment
Threats: Igor the Hacker
The previous post explored different types of threats. Now that we’ve taken a look at what some of the threats are, let’s look at who might be behind these threats. One goal is to determine who the greatest threat is. … Continue reading
Posted in Security
4 Comments
Using OpenLMI to join a machine to a FreeIPA domain
Stephen Gallagher has published an article on how to use OpenLMI to join a FreeIPA domain. The article is available on his blog at sgallagh.wordpress.com As Stephen notes: “Traditionally, enrolling a system has been a “pull” operation, where an admin … Continue reading
Posted in System Management
Leave a comment
Threats
The previous article looked at operational integrity. Let’s shift back to a security discussion and take a look at threats. Any intelligent discussion of threats starts out by looking at what you are protecting, how it can be threatened, and … Continue reading
Posted in Security
Leave a comment
OpenLMI Ships in RHEL 7
RHEL 7, the latest version of Red Hat Enterprise Linux, was announced today with immediate availability. OpenLMI is included in RHEL 7 – in fact, it was identified in the announcement keynote as one of the key new technologies in … Continue reading
Posted in System Management
Leave a comment
New OpenLMI Web Site
I usually hate announcements of web site redesigns – “to enhance readability we have moved to Pretentious_Obscure_Font and changed the borders”… But I think you will like what we’ve done at http://www.openlmi.org. First, we’ve totally redone the site navigation. There … Continue reading
Posted in System Management
Leave a comment