First FreeBSD 10.0 auto-provisioning template is done. Just gotta resize it for our other common sizes and it'll go on the order page. phlux: i can probably re-image your VMs with 10.0 some time this week up_the_irons excellent news :) pjs: yeah, and it's all virtio too which, unfortunately for me, means i can only put it on a possible of 8 servers, instead of all 30, but that count is going higher every week as i upgrade hosts Ahhh up_the_irons so is it safe to start ordering new VM's with 10.0 on it then? :) cause I just wanna rebuild my VM's and one by one replace the current ones pjs: i'll probably need another day or two to finalize everything; didn't get much sleep last night, so probably not going to get a lot done regarding fbsd 10 today up_the_irons all good.. I'm a patient man ;) :) up_the_irons: I ended up just reimaging myself with 9.2 phlux: yeah i think i meant pjs ah up_the_irons: i don't suppose you've had time to look at implementing spice remote access with the new kvm yet? nope it looked like with qemu/kvm it's vnc or spice.. but probably reasonably easy to do spice instead of vnc, but would require being able to set different startup switches but maybe could be looked at when you're looking at something else yeah What is port knocking? @google "port knocking" 9,850 total results returned for '"port knocking"', here's 3 Port knocking - Wikipedia, the free encyclopedia (http://en.wikipedia.org/wiki/Port_knocking) In computer networking, port knocking is a method of externally opening ports on a firewall by generating a connection attempt on a set of prespecified closed ... That grumpy BSD guy: Why Not Use Port Knocking? (http://bsdly.blogspot.com/2012/04/why-not-use-port-knocking.html) Apr 11, 2012 ... Why not set up port knocking? Well, as you may have guessed I'm about to tell you about a few whys not. I've been circling port knocking as an ... PORTKNOCKING - A system for stealthy authentication across ... (http://www.portknocking.org/) Jun 6, 2013 ... Port knocking is a stealthy network authentication system that uses closed ports to carry out identification of trusted users. The system permits ...