Feeds

Linux infiltrates Homeland Security, and other conspiracies

Strategic Tux Initiative...

  • alert
  • submit to reddit

The essential guide to IT transformation

A tipster draws our attention to a posting from one Saddam Hussein on the linux-elitists list, pointing out an oddity concerning the US Department of Homeland Security's newly-launched web site. The site was announced on Friday, running on a spiffy combo of Linux and Oracle 9i, but if you consult its recent history at Netcraft you'll note that this isn't the full story.

It was JRun Web Server on Windows 2000 at a netblock owned by the US Office of Personnel Management up until the grand unveiling, then it switched over to proper hosting solutions.

Enter X-files conspiracy theorists. Did not Homeland Security launch its site just as the dreaded worm hit? Might they not have run cover? Well no, it's inconceivable that you could whizzle up a whole Linux/9i web site in a couple of hours, so they'd have had to know about the worm well in advance in order to be able to do that. Which we agree has the makings of a much better X-files conspiracy theory - government-sponsored cyber counter-terrorism, anyone?

Saddam has what appears to be the text of the press release announcing the site, which is described as having been "designed, tested and deployed within 30 days." Which isn't a couple of hours, but is pretty good, and a pretty good commercial for the software. The Windows 2000 report predecessor, we'd guess, was merely a placeholder ahead of the switch on.

Still, it's nice to see Linux defending the homeland, and to know that the Department of Homeland Security doesn't hold with this stuff about the GPL being communism. Unless... Now, there's another good conspiracy theory... ®

Related links:
linux-elitists

Next gen security for virtualised datacentres

More from The Register

next story
MEN WANTED to satisfy town full of yearning BRAZILIAN HOTNESS
'Prettier, better organised, more harmonious than if men were in charge'
Cops baffled by riddle of CHICKEN who crossed ROAD
'Officers were unable to determine Chicken's intent'
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Drunkards warned: If you can't walk in a straight line, don't shop online, you fool!
Put it away boys. Cover them up ladies. Your credit cards, we mean
Why your mum was WRONG about whiffy tattooed people
They're a future source of RENEWABLE ENERGY
Murder accused DIDN'T ask Siri 'how to hide my roommate'
US court hears of cached browser image - not actual request
Chomp that sausage: Brits just LOVE scoffing a Full Monty
Sales of traditional brekkie foods soar as hungry folk get their mitts greasy
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?