A repository of information technology questions and answers

Latest posts

Preventing a Solaris 'Ping of Death' attack

The Ping of Death attack, first seen in 1996, is achieved using the Internet control message protocol, or ICMP (hence the name ?Ping of Death?).

Writing man pages

Every good program that can be used from the UNIX shell should be documented with a good man page.

Setting VxVM permissions on volumes

Witihout using vxedit to change permissions VxVM device files go back to the defaults each time vxconfigd is enabled or the system rebooted.

Veritas Volume Manager state flowchart

This diagram is derived from the Veritas Volume Manager (VxVM) Performance and Tuning course notes. Additional state paths have been added.