How to set up RAID10 on LSI MegaRAID controllers


I ordered a new server with four 2TB drives for a client. At first I considered arraying them as RAID5 with a hot spare, but reconsidered when the benefits of OBR10 (one big RAID10) came to light. For this client, RAID10 is an appropriate balance between performance, speed and disk space.

When booting into the “WebBIOS” for the RAID card, it wasn’t readily apparent how to configure RAID10. For those in a similar boat, here’s how to do it.

Continue reading How to set up RAID10 on LSI MegaRAID controllers

Why Time Machine may ask for full backups more often on OSX Mavericks

OSX Mavericks introduced a few new battery-saving features: timer coalescing, App Nap and Safari Power Saver. On my early 2011 MacBook Pro, I’ve seen a legitimate 15-20% increase in overall battery life since upgrading to Mavericks.

However, I also noticed Time Machine was asking for a full backup almost once a week. This is frustrating because I push my backups over Wi-Fi, and a full backup (more than 100GiB) takes hours. That, and I don’t want to lose my backup history every week.

Continue reading Why Time Machine may ask for full backups more often on OSX Mavericks

Harden DD-WRT against DNS rebind attacks

Yesterday I watched the presentation by Craig Heffner at DEFCON 18, where he describes using DNS rebind attacks to gain access to routers’ configuration pages from the public Internet. It’s a pretty complicated attack, requiring a rogue domain and server, and whose success relies on two pretty glaring end-user mistakes:

  1. Visiting that rogue domain and server; and
  2. Leaving a weak or default username and password on the router’s admin page.

Most people savvy enough to flash their router with DD-WRT know enough to steer clear of those mistakes, but it still bothers me that DD-WRT remains technically vulnerable to this attack.

Continue reading Harden DD-WRT against DNS rebind attacks

Speed up and customize

What is The City?

Our church recently purchased an instance of The City from ACS Technologies, a networking and management tool that makes doing things as the body of Christ easier, more organized, and more fun. It’s a great app, under constant development, with generally very good features and speed.

Slow Internet kills

We, however, are chained to an Internet connection completely unsuitable for such dependence on the cloud. The best Internet connection available to our building flies over long-distance wireless, which makes for a fairly narrow and leaky pipe. Comcast will talk to us, but it may be a while before we’re in 20mbit business-class goodness.

Consequently, Sunday mornings are a nightmare. Our children’s check-in system is run via The City, and combined with the usual spike in Sunday traffic, things can get very slow. Like, unresponsive, completely broken, pull-my-hair-out slow. I employ some reasonable QoS settings in our gateway’s firmware, but something told me I could do better.

Continue reading Speed up and customize

The Heart of a Hacker

This article originally appeared in issue 29:1 of 2600 Magazine’s The Hacker Perspective column.

The Jargon File provides several widely accepted definitions for the term hacker, the one of which I find most suitable is “one who enjoys the intellectual challenge of creatively overcoming or circumventing limitations.”1Countless others define hackerdom in terms of personality types, temperaments, tendencies and habits generally associated with computer enthusiasts. These definitions serve us well on a superficial level; however, I seek to define hackerdom in terms of something much more broad and encompassing. I aim to reveal something I don’t believe anyone has before: the heart of a hacker. Maybe we haven’t done this because we find comfort behind veils of secrecy and anonymity; today, I’ll do what hackers do best: fly in the face of established norms.

Continue reading The Heart of a Hacker