Have you ever tried to figure out how to make Squid authenticate users according to your own exotic rules? Users are in a DB? Are you using an ActiveDirectory? Users/passwords are authenticated by a java class? Everything is possible. Here I intend to explain how to make your own custom authentication helpers so you can develop your own routines for your own requirements.
Toward the end of 2005 I was reading about “the year for Linux” everywhere I went. No matter where I looked, I always found articles by GNU/Linux fans (like me) that expected this year (2006) to be “the year for Linux” (once and for all). In fact, it’s been quite a few years now that I’ve been reading that “this will be the year for Linux”. And let me tell you something: I don’t want the year for Linux to come... ever! Period.
In this article I will describe an experience I had that began with the failure of some RAID5 disks at the Hospital of Pediatric Especialties, where I work. While I wouldn’t wish such an event on my worst enemy, it was something that made me learn about the power of knowledge—a deep knowledge, which is so important in the hacking culture.