Linux.com

Community Blogs



How to use GIT to backup your files

Well not exactly Git but a software based on Git known as BUP. I generally use rsync to backup my files and that has worked fine so far. The only problem or drawback is that you cannot restore your files to a particular point in time. Hence, I started looking for an alternative and found BUP a git based software which stores your data in repositories and gives you the option to restore data to a particular point in time.

Read More 

 

End of life / end of support for HP servers

Hi,

    Can anyone help me how to find the End of life / end of support for HP servers.

 

Thanks in advance

R.Pugazhendhi

 

How to find the exact memory usage of your App on Linux

 

Linux memory management has always intrigued me. While learning Linux, many concepts are confusing at first, but after a lot of reading, googling, understanding and determination, I learned that the kernel is not only efficient at memory
management but also on par with artificial intelligence in making memory distribution decisions..

This post will hopefully show you how to troubleshoot or at least find out the
amount of memory used by Linux and an application running on it. If you have any
doubts, do let me know by commenting. 

 

http://techarena51.com/index.php/linux-memory-usage/

 

5 Awesome Open Source Backup Software For Linux and Unix-like Systems

good backup plan is essential in order to have the ability to recover from, Human errors, RAID or disk failure, File system corruption, Data center destruction and more. In this post I’m going to list amazingly awesome open source Backup software for you.

Read more 

 

How to Fix SSLv3 Vulnerability (POODLE) in Apache and NGINX on CentOS

POODLE (CVE-2014-3566) is an security vulnerability in SSLv3 discovered by Google in September. POODLE stands for Padding Oracle On Downgraded Legacy Encryption. All the websites supporting SSLv3 is vulnerable to POODLE, even if it also supports more recent versions of TLS. Using POODLE a hacker run Man-in-the-middle attacks attacks in your network stream and can steal secure HTTP cookies.

Read complete article here to check how to fix this issue on Apach2(HTTPD)/NGINX Servers on CentOS/RHEL Systems.

 

8 Tips to Solve Linux & Unix Systems Hard Disk Problmes Like Disk Full Or Can’t Write to the Disk

Can't write to the hard disk on a Linux or Unix-like systems? Want to diagnose corrupt disk issues on a server? Want to find out why you are getting "disk full" messages on screen? Want to learn how to solve full/corrupt and failed disk issues. Try these eight tips to diagnose a Linux and Unix server hard disk drive problems. 

Read more: 8 Tips to Solve Linux & Unix Systems Hard Disk Problmes Like Disk Full Or Can’t Write to the Disk

 

Why To Use Cloud Hosting Technology?

Cloud hosting? It's a buzz-phrase, it's popular and appears to work – but is that enough justification for you really to utilize it? Cloud hosting has its pros and cons, just as the traditional IT solutions it replaces. Read the list below to see if oahu is the right solution for you.

 

Actually, What Is Cloud Hosting?

 

First of all, let's make sure most of us have exactly the same perception of ‘cloud hosting '. The concepts of cloud hosting and computing aren't new. You can consider ‘cloud' as a kind of shorthand to explain a network of computing resources(typically servers). A user connecting to the ‘cloud' via a terminal, a PC or a mobile device like a smartphone can utilize the resources in the cloud to store data and run software applications on the servers in the cloud. To mix metaphors a little, the cloud is just a black box: as long as do you know what you place in and that which you escape, you do not have to be concerned about the way the cloud works inside. Physically however, the computer files and commands you send to the cloud all go to one or more real servers somewhere and connected to the network (very often the Internet) that you too are accessing. The recent development in cloud hosting that folks speak about today has come about as more and more service providers have made online computing resources available as services to consumers and enterprises.

 

What are the Fortes of Cloud Hosting?

 

Cloud hosting services that are available over Internet frequently have the next advantages:

 

Financial Flexibility. You rent a site from somebody else rather than investing in your server. Which means you pay lower monthly charges (some cloud hosting is even free), rather than committing a more substantial quantity of capital. In many cases, cloud hosting can be more cost-effective. However, you must always compare the sum total startup and ongoing costs of all of the solutions you're considering (cloud or other) to see what's best for you.

 

Universal Access. You can connect to the cloud hosting service anywhere you can connect to the web. With broadband, 3G and Wi-Fi access points, meaning pretty much everywhere.

 

Reliability and Resilience. Service providers have extensive server networks and can host multiple copies of your data in different locations. If you have a problem with a server in one single place, your data can be recovered from another server elsewhere on the network.

 

Scaling of Resources. For a person person or company, there's typically no limit to the total amount of storage space or power for applications that may be made available. Cloud hosting providers operate huge, networked data centers giving ample room for growth for only the largest customers.

 

Up to Date Backup and Encryption Software. Cloud hosting services run current versions of software and a number of them also provide ‘strong encryption ', which makes it practically impossible for someone minus the encryption key to hack your data. However, see below for more information.

 

Service Choice and Flexibility. Because you rent a site rather than invest in your server, you can even move your data from one cloud hosting provider to some other if you obtain another hosting deal you prefer.

 

Eco-friendly. Cloud resources are also shared between customers (with appropriate security), making total power consumption per customer less than if each customer had to utilize its own individual private server.

 

                    

Please check at http://www.thesagenext.com if you are looking for cloud hosting.

 

 

 

 

TLS encryption and mutual authentication using syslog-ng Open Source Edition

Collecting log messages is an essential part of managing, maintaining, and troubleshooting IT systems. Since your log messages can contain all kinds of sensitive information, you should make sure that they are kept safe. The easiest way to protect the log messages as they are transferred from your clients to your logserver is to authenticate and encrypt the connection between the client and the server.

This tutorial shows you step-by-step how to create the certificates required to authenticate your server and your clients, and how to configure syslog-ng Open Source Edition (syslog-ng OSE) to send your log messages in an encrypted connection. Installing syslog-ng OSE is not covered, but downloading it for your platform and installing it should be easy.

Read more... Comment (6)
 

Password Management Market Trends and Forecast 2014

Password Management Market

Passwords act as the authentication tool and a defense against attempts of unauthorized access. Password management has emerged as a major segment of identity management market. Human generated passwords are often algorithmically weak and prone to attacks. In the recent years, the importance of password management (also known as sensitive or shared password management or password vaulting) has grown enormously for both the enterprise and individual users owing to increased number of password secured accounts including financial, social, and official, among others. It is difficult for users or enterprise to remember all the passwords. Rise in the complexity and number of complex systems being deployed across the organizations, and strict compliance requirements and rules for generating and changing passwords makes it complicated to manage the passwords. Further, the password management problems often cause expensive delays and loss of productivity. Such issues are easily solved while using password management solutions.

Browse Full Report @ http://www.transparencymarketresearch.com/password-management-market.html

Moreover, increased instances of attacks by hackers have increased concerns toward password security and this is helping in growing demand for password management solutions. The password management products and solutions are deployed either on-premise environment or in hosted environment over cloud. The rapidly growing cloud market presents a great opportunity in the hosted password management market.

Low success of password self-service projects among end-users until now is a key concern among industry players. However, as the awareness toward the benefits of deploying such a model is increasing it is anticipated that self-service solutions would find increasing demand during the coming years. Also, growing customization, synchronization, and extension requirements are driving the demand for more extensive and sophisticated password management solutions. In order to provide improved password management and security to account, industry players such as Microsoft and Google are offering newer ways for managing passwords such as USB tokens and automatic encrypted solutions.

Two major segments of password management market are privileged password management and self services password management. Self service password management provides features such as management and resetting of passwords to the employees without needing the help of helpdesks. This helps in saving the valuable time of the IT personnel and reduces cost. The privileged password management solutions offer higher security to passwords by maintaining the passwords of privileged users deploying various methods including frequent randomization of passwords, automated password resets and privileged session recording. Key end-use sectors in this market include banking, financial services and insurance (BFSI), telecom and IT, energy and utility, public sector, manufacturing, education, healthcare and life sciences, education and retail and distribution, among others.

 

Linux Debian with PXE and AOE server to install windows 7/8

I wanted to be able to install Win7 over PXE but got a head acke when I read a few tutorials about it and thought to myself there should be a easier quicker way. Indeed there is using AOE (ATA Over Ethernet). I found a nice howto here but it is aimed at a Windows Server. I came up with a way to do this in Linux.

This will work on Debia Squeeze and Wheezy. I have not tried this with the Windows 7 CD, only tried this with my jump drive.

Software needed

  • Base system of Debian
  • DNSMasq - via APT
  • iPXE boot CD
  • Syslinux - via APT
  • vblade - via APT
  • Windows 7 or 8 in jump drive form

Install DNSMasq and Syslinux with apt -- sudo apt-get install dnsmasq syslinux -- Configure DNSMasq with nano or vi to your liking -- sudo nano /etc/dnsmasq.conf --. You can use my config if yo wish.

interface=eth1
listen-address=127.0.0.1
domain=
dhcp-range=192.168.0.50,192.168.0.150,12h
dhcp-boot=pxelinux.0
enable-tftp
tftp-root=/tftpboot/
log-queries
log-dhcp
 
We also need to make the NIC to run a static address. As you can see I am using eth1 but you might be using eth0 so keep in mind yours might be different. To give your NIC a static address edit -- sudo nano /etc/network/interfaces -- here's mine for a example.
 
allow-hotplug eth1
iface eth1 inet static
        address 192.168.0.1
        netmask 255.255.255.0
        network 192.168.0.0
        broadcast 192.168.0.255
 
Just make sure you use the correct IP subnet that matches DNSMasq. After editing the interfaces file you need to restart the device. -- /etc/init.d/networking restart --
 
We can now move on to the PXE layout. The root directory I use is /tftpboot so i'll use it in the tutorial.
create a new directory for tftp -- sudo mkdir -p /tftpboot --  and also -- sudo mkdir -p /tftpboot/pxelinux.cfg --
Copy a couple of files from syslinux to the tftpboot directory -- sudo cp /usr/lib/syslinux/menu.c32 /tftpboot -- -- sudo cp /usr/lib/syslinux/pxelinux.0 /tftpboot -- After that we can create the default file for PXE -- sudo nano /tftpboot/pxelinux.cfg/default -- Here is a simple setup I use.
 
DEFAULT menu.c32
PROMPT 0
MENU TITLE PXE Boot
TIMEOUT 100

LABEL Install Win7
MENU LABEL Install Win7
kernel ipxe.krn
initrd conf.ipxe

Just save and exit. Now download iPXE's boot CD and mount it. -- wget http://boot.ipxe.org/ipxe.iso -- to mount it issue this -- sudo mount -o loop ipxe.iso /media -- cd in to /media and copy boot.cat and ipxe.krn to the root of the tftpboot directory. -- sudo cp boot.cat ipxe.krn /tftpboot -- unmount the ipxe.iso --sudo umount /media -- Now we need a config file for iPXE to boot a AOE. -- sudo nano /tftpboot/conf.ipxe -- It should look like this

#!ipxe
dhcp net0
set keep-san 1
sanboot aoe:e0.1

In all tha was the hard part. The easy part is setting up AOE. Debian's kernel has the module ready to go but has to be enabled. -- modprobe aoe -- now we need to add it to the modules file so it is loaded when the system boots. -- sudo nano /etc/modules -- Should look like this

# /etc/modules: kernel modules to load at boot time.
#
# This file contains the names of kernel modules that should be loaded
# at boot time, one per line. Lines beginning with "#" are ignored.
# Parameters can be specified after the module name.

aoe
loop

Now install vblade -- sudo apt-get install vblade -- Copy the Win7 or 8 USB jump drive using disk dump. I put mine in the /tftpboot/win7 directory. -- sudo mkdir -p /tftpboot/win7 -- -- sudo dd if=/dev/sde of=/tftpboot/win7/win7.img bs=4M -- It will take about five or ten minutes to copy. When finished we can start vblade. -- sudo vbladed 0 1 eth1 /tftpboot/win7/win7.img -- You can create a script or even issue it in the rc.local file to start everytime the system boots. All what is left is to restart DNSMasq and test it out with Virutal Box or a real system. -- sudo /etc/init.d/dnsmasq restart --

Hope you'll enjoy this tutorial.

 

Linux: Hide Processes From Other Users

I run a multi-user system. Most users access resources using ssh client. How can I stop leaking process information to all users on Linux operating systems? How do I prevent users from seeing processes that do not belong to them on a Debian/Ubuntu/RHEL/CentOS Linux server?

Linux: Hide Processes From Other Users

 
  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  6 
  •  7 
  •  8 
  •  9 
  •  10 
  •  Next 
  •  End 
  • »
Page 1 of 10

Upcoming Linux Foundation Courses

  1. LFD211 Introduction to Linux for Developers
    08 Dec » 09 Dec - Virtual
    Details
  2. LFS220 Linux System Administration
    08 Dec » 11 Dec - Virtual
    Details
  3. LFD331 Developing Linux Device Drivers
    15 Dec » 19 Dec - Virtual
    Details

View All Upcoming Courses


Who we are ?

The Linux Foundation is a non-profit consortium dedicated to the growth of Linux.

More About the foundation...

Frequent Questions

Join / Linux Training / Board