« Back to home

Security practices: experts vs non-experts

Google recently published the results of a survey of computer users to see what security practices they follow. The paper splits the users into two groups — security experts (people who deal with computer security for a living as part of their job, like me), and non-expert users. For each of the two groups, Google assembled a list of the top five security practices followed. You probably won’t be surprised to learn that the two groups had almost completely different lists.…

Read more »

Setting up DB2 on Linux

This is a quick sketch of the typical process for setting up individual user IDs to access a DB2 database on a Linux-based DB2 server — basically, the bare essential things to do which aren’t covered by the DB2 installation guide. Before attempting the DB2 install, install the necessary additional packages:

apt-get install libxrender1 libxft2 libxtst6 libxi6 libaio1 ksh libstdc++6-4.4-dev libstdc++6-4.4-pic libstdc++5 rpm Install DB2, and check licensing is set up correctly via db2licm -l.

Read more »