Carole Fennelly's social engineering column is a hit, and one reader offers a suggestion for using idle CPU cycles that doesn't involve searching for aliens
Praises for column on social engineering
This article is very well written and includes a lot of truths that most of us computer security folks do not take into consideration. Thank you!
I thought that this particular article was brilliant. I am an avid follower of all matters relating to Internet security, and this one is a must-read.
Ed was right on
I agree completely with Edgar Saadi in his response to the question of whether a sysadmin should pursue database or security administration. I am a DBA, and have been a security administrator in the past as part of my duties in deploying Web- and database-driven applications. In my humble opinion, security -- for both systems and networks -- is a facet of database/systems/network/applications design, and is a fundamental requirement for anyone deploying new systems. As a DBA, I've found it necessary to keep up on a broad range of skills, as no one can properly deploy a database without understanding the underlying (Unix) systems and the networks that connect that database to its users.
I enjoyed the article "A busy computer is a happy computer," but Rich Morin only discusses ad hoc programs which solve specific problems (like SETI@home). In contrast, a system called Condor allows organizations to make use of idle machines to run any program without having to change any of their source code. Instead of running a program in the background, you submit your program to Condor. Condor finds an idle machine on your network, runs your jobs there, and can even transparently migrate a running process to a different machine -- allowing you to move the work back to your own terminal when you come back from lunch! Condor is available as a free download at http://www.cs.wisc.edu/condor. Many companies, universities, and government labs are using Condor to scavenge for cycles for their own CPU-bound simulation, scientific, or engineering codes. I think many of SunWorld's readers would like to know how to use idle CPU cycles for their own programs, instead of solely searching for aliens.
If you have technical problems with this magazine, contact firstname.lastname@example.org