Using Selenium for automated website testing. Continue reading
Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux kernel. Continue reading
Bridged networking allows KVM guests to connect to the outside network through the physical interface, making them appear as normal hosts to the rest of the network. Continue reading
KVM is a full virtualisation solution for Linux on x86 (64-bit included) hardware containing virtualisation extensions, Intel VT or AMD-V. It consists of a loadable kernel module that provides the core virtualisation infrastructure and a processor specific module, kvm-intel.ko or kvm-amd.ko. Continue reading
The following is part 3 of a 3 part series that goes over installation and configuration of Xen live migration with DRBD.
This article covers a installation and configuration of a DRBD resource. Continue reading
The following is part 2 of a 3 part series that goes over installation and configuration of Xen live migration with DRBD.
This article covers a creation of a Debian guest domain (domU virtual machine) which we will later use to migrate between the two Xen hosts. Continue reading
We have two Debian Jessie servers which we are going to configure as Xen hosts (domain 0) and implement live migration via DRBD. The main goal of this project is to test Xen live migration. Continue reading
How to resolve WiFi issues on Dell Inspiron 5559 running Debian Jessie with kernel 4.2. Continue reading
How to resolve sound issues on Dell Inspiron 5559 running Debian Jessie. Continue reading
Nasty is a tool which can help us to recover a GPG passphrase. Continue reading