Why is a Werewolf not immune to Sanguinare Vampiris?

The point of an exercise in dissecting a contentious issue is not that you must agree 100% on the solutions to the issues by the end. The point is to find where you and the other members agree and where you and the others agree either that a) further research is needed or b) fundamentally different approaches are being proposed.

Your desire not to sign off unless you agree 100% with everything in the document essentially defeats the integrity of the exercise. You are allowing your (preconceived) stand to override the goal of finding common ground. Common ground is saying "We agree on these statements, we need more time on these statements, and we disagree on these statements."

So, first compile a document that presents the statements where you both agree, where you both agree that further research is required, and where you both agree that you both disagree.

Then, prepare an addendum. Present your views for the statements where you disagree. Invite your co-author to do the same.

Avoid using the addendum as a way to poke holes in the main document. The addendum should be of the tone "I FULLY agree with the presentations in the main document. I see issues however at the noted points of disagreement. My reasons are as follows: ..." Limit the addendum to a minimum (e.g. one page or even one paragraph).

Submit the document and the two addendum pages.


I answered a similar question the other day here:

Secure LAMP server for production use

To check for compromise..

Suspicious files in /tmp. Files in the Web tree unexpected.

Kernel modules loaded that look suspicious. (lsmod)

Processes running that shouldn't be. (ps aufx)

Active network connections. (netstat)

Currently open file descriptors. (lsof)

Ultimately, if the server is compromised, the proper thing to do is to isolate, image, and rebuild.

Edit 1

Bart brought up very good points; especially that you can't trust the local system at all if believed to be compromised.

Once imaged, you can manipulate the image (and filesystems) using known trusted utilities for further forensics.

Dumping traffic on a switch or running a tcpdump on the local system could be useful as well.

Edit 2

I've actually copied utilities from a known good system and used on a remote server before. Not ideal, but better than nothing.


With Adobe Acrobat 9 Pro the options it presents for transitions in its internal drop down menu (Advanced->Document Processing->Transitions) correspond to multiples of 45 degrees. Indeed, the following gives a second transition sliding diagonally using the option direction=45. Also direction=180 gives me the opposite to direction=0. Seeing this may require using an Adobe viewer.

\documentclass{beamer}

\begin{document}
\begin{frame}{Slide 1}
  \begin{block}{Title 1}
    Blah blah blah.
  \end{block}
\end{frame}

\begin{frame}{Slide 2}
\transpush[direction=0,duration=1]
\begin{block}{Title 2}
  Again blah blah blah!
\end{block}
\end{frame}

\begin{frame}{Slide 3}
\transpush[direction=45,duration=1]
\begin{block}{Title 3}
  Again blah blah blah!
\end{block}
\end{frame}
\end{document}