Feeds

Linux infiltrates Homeland Security, and other conspiracies

Strategic Tux Initiative...

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

A tipster draws our attention to a posting from one Saddam Hussein on the linux-elitists list, pointing out an oddity concerning the US Department of Homeland Security's newly-launched web site. The site was announced on Friday, running on a spiffy combo of Linux and Oracle 9i, but if you consult its recent history at Netcraft you'll note that this isn't the full story.

It was JRun Web Server on Windows 2000 at a netblock owned by the US Office of Personnel Management up until the grand unveiling, then it switched over to proper hosting solutions.

Enter X-files conspiracy theorists. Did not Homeland Security launch its site just as the dreaded worm hit? Might they not have run cover? Well no, it's inconceivable that you could whizzle up a whole Linux/9i web site in a couple of hours, so they'd have had to know about the worm well in advance in order to be able to do that. Which we agree has the makings of a much better X-files conspiracy theory - government-sponsored cyber counter-terrorism, anyone?

Saddam has what appears to be the text of the press release announcing the site, which is described as having been "designed, tested and deployed within 30 days." Which isn't a couple of hours, but is pretty good, and a pretty good commercial for the software. The Windows 2000 report predecessor, we'd guess, was merely a placeholder ahead of the switch on.

Still, it's nice to see Linux defending the homeland, and to know that the Department of Homeland Security doesn't hold with this stuff about the GPL being communism. Unless... Now, there's another good conspiracy theory... ®

Related links:
linux-elitists

Build a business case: developing custom apps

More from The Register

next story
Drunkards warned: If you can't walk in a straight line, don't shop online, you fool!
Put it away boys. Cover them up ladies. Your credit cards, we mean
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Murder accused DIDN'T ask Siri 'how to hide my roommate'
US court hears of cached browser image - not actual request
Cops baffled by riddle of CHICKEN who crossed ROAD
'Officers were unable to determine Chicken's intent'
Why your mum was WRONG about whiffy tattooed people
They're a future source of RENEWABLE ENERGY
Chomp that sausage: Brits just LOVE scoffing a Full Monty
Sales of traditional brekkie foods soar as hungry folk get their mitts greasy
Nuts to your poncey hipster coffees, I want a TESLA ELECTRO-CAFE
Examining the frothy disconnect in indie cafe culture
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
BYOD's dark side: Data protection
An endpoint data protection solution that adds value to the user and the organization so it can protect itself from data loss as well as leverage corporate data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?