Fedora 20 and Locking the CD-ROM Drive From Ejecting

I have an 18 month old toddler that loves to run up to my laptop while I’m working and push the eject button on CD-ROM drive and pull on the tray. One of these days, I’m worried he’s going to break it off.

It is possible, using the ‘eject’ command, to lock the tray and prevent it from being ejected by the button.

On Fedora 20, you’ll need to perform a few steps as root to get it working.

  1. Copy
  2. Open the copied file, and comment out the line beginning with ENV{DISK_EJECT_REQUEST}==
  3. You may need to force udev to trigger your rules: udevadm trigger

You can now use the eject command to enable the lock. Executing eject -i on will spit out eject: CD-Drive may NOT be ejected with device button, effectively locking your toddler out of your CD-ROM drive.

Migrate Hyper-V Windows Guest to KVM w/ libvirtd

Microsoft Hyper-V is a great hypervisor if all you have are Windows guests. Unfortunately, the support for Linux guests is not the greatest. KVM, on the other hand, has great support for both Windows and Linux guests. For this reason, I’ve been working on moving the hypervisor I have in my home from Hyper-V to KVM.

KVM BannerThis post will detail the steps necessary to migrate a Windows guest from Hyper-V to KVM. The version of Hyper-V I’m running is 2012R2 and the guest is Windows 8.1.

Continue reading Migrate Hyper-V Windows Guest to KVM w/ libvirtd

Heartbleed, What it is, What Should you do?

As long as you haven’t been hiding under a rock for the past week or so, you’ve most likely heard of a fairly catastrophic security issue called “Heartbleed.”

Rather than boring you with the details of what Heartbleed is, I found a great video that wonderfully describes it and its ramifications from a high level:

And, rather me tell you what to do, I’ll let Brian Krebs, one of the foremost security journalists tell you: Krebs on Security: Hearbleed Bug: What can you do?

Finally, if all you want to do is check if a particular website is vulnerable, I suggest using the tool from possible.lv: http://possible.lv/tools/hb/. This tool will also be able to tell you if a particular websites certificate has been changed since the vulnerability was discovered.