How Do Troubleshoot “write failed” or “quota exceeded”?

Problem scenario
You are using Linux and, you get an error like “write failed” or “quota exceeded.” What should you do?

Possible Solution #1
Delete files. Has a runaway program created too many files recently?

Possible Solution #2
You may want to run a quotacheck command because the quota statistics have not been updated.

What Can You Do when Your Weightlifting Shoes Are Too Tight?

Problem scenario
You bought new weightlifting shoes. They seem to tight. They are not comfortable. What should you do?

Possible Solution #1
If only one shoe feels too tight, can you see if the tongue is double-up or folded on one side? By flattening it or unravelling it, that may help.

Possible Solution #2
Can you make the velcro strap connect without as much force and tightness?

How Difficult Is It to Change a Headlight Bulb?

Problem scenario
A head lamp bulb needs to be replaced on a car. How difficult is it?

Answer
It is usually fairly easy and does not require tools. Changing blinkers (turn signal bulbs) and headlights is often straight-forward. The bulbs for headlights are smaller than you would think; normally they are much smaller than a typical household lightbulb.

What Can Go Wrong if You Try to Remove a Car Stereo?

Problem scenario
You want to remove a car stereo. Can something go wrong if so what should you look out for?

Solution
Yes. The airbags could be triggered. The car alarm could go off. Some anti-theft devices sound an alarm if the car stereo is tampered with.

You do not want the airbags to potentially inflate suddenly causing injury to you.

Security Quiz

1. Most security vulnerabilities are from new or previously unknown problems. True or False?

2. What is one of the protocols IPsec uses to secure IP layer communications?

_________________________________________

3. What is defense in depth (or DiD)?

a. A type of highly-secure cryptography for data at rest.
b. A type of highly-secure cryptography for data in transit.
c. Both of the above.
d. The implementation of a combination of security measures that may be disparate and redundant for achieving security from a pragmatic perspective.