F5 load-balancers do a lot of things very well, but they’re not good at lying. When you want your F5 DNS to give out IPs that aren’t the ones it’s getting from the LTMs, a bit of persuasion is required… Continue reading “Using F5 DNS in the Public Cloud”
Over the last few weeks, as mentioned before, my colleagues and I have been working to implement a proxy server solution. One of the more aggressive bugbears we’ve fought is the size and complexity of our network — we have dozens of different network segments, some of which have pre-existing proxies, many of which are out of my team’s control. Finding a solution that worked well, everywhere, was tricky. But we’ve made progress.
Continue reading “Location Awareness in Proxy PAC Files”
At work, I’ve spent much of the last several weeks working on deploying a proxy service. A proxy is a service that can retrieve and cache Web pages on behalf of a large number of users.
In theory, you can use it to save bandwidth and protect your users by stopping viruses and such before they reach the users’ desktops. In practice, it’s mostly used to make sure your employees aren’t screwing around on Facebook at work.
Continue reading “Uncle Dave’s Proxy Toolkit”
No, not that Enterprise.
Nope. Try again.
This is about “the enterprise,” the notion of organizations that upgrade software less often than once every six weeks, and one vendor that wants to push things along, no matter the cost to the users…
Continue reading “Yoast vs. The Enterprise”
I had a software installer that needs to be distributed with its license key, but in a way that keeps the users safe from themselves, and us safe from auditors. Find out how I did this in about an hour with NSIS below…
Continue reading “Super-Simple Self-Extracting Installer with NSIS”