Home Linux Community Community Blogs

Community Blogs

How to Fix SSLv3 Vulnerability (POODLE) in Apache and NGINX on CentOS

POODLE (CVE-2014-3566) is an security vulnerability in SSLv3 discovered by Google in September. POODLE stands for Padding Oracle On Downgraded Legacy Encryption. All the websites supporting SSLv3 is vulnerable to POODLE, even if it also supports more recent versions of TLS. Using POODLE a hacker run Man-in-the-middle attacks attacks in your network stream and can steal secure HTTP cookies.

Read complete article here to check how to fix this issue on Apach2(HTTPD)/NGINX Servers on CentOS/RHEL Systems.


Smart Watches Market - Latest Technology Research Report and Industry Analysis upto 2020

The global smart watches market is expected to show a remarkable growth rate by coming years. One of the major factors contributing the growth of the global smart watches market is the entrance of big vendors in the market. The market has also witnessing an increase in R&D spending. The global leading players such as Sony, Samsung, Pebble, and Maritime have increased their R&D investments for smart watches. For that, they are entering into partnerships with value-added resellers and suppliers and investing in R&D activities. These increasing R&D investments are helping players to introduce new products with better integration ability and accuracy. This will help with the reduction in smart watch prices and lead to an increase in their adoption among consumers.

Read More Info @

Although the various driving factors, the global smart watches market is retraining due to the lack of proper technology standards. In addition, this is a new and emerging technology and thus technology standards are not clearly defined. The wearable computing device has failed because of the bulkiness, ugly look, battery issues and weak functionality. However, after the launch of number of new smart watches, consumer perceptions have changed. Nowadays, smart watches have become an important accessory to smartphones and an independent communication device. In future, smart watches will have a screen which potentially run software and allows to serve a robust extension to smartphone operating systems and apps.

The global smart watches market is segmented into two major categories, on the basis of application into general consumers, sports and healthcare and others. The market is also segmented on the basis of product characteristics into companion devices and standalone smart watches.

The market is driven by factors such as the rapidly growing consumer electronics goods industry and its distinctive features. The rapid technological advancements and changing consumer preferences will also act as drivers for the global smart watches market. Other factors fuelling the growth of the global smart watch market are the growing adoption of wireless technologies and softwares. Also the continuous adoption of mobile processor technologies is driving the demand for this market.




Data-protector Installation on VMware on Linux Desktops


Data is one of the most crucial elements for security and protection. Tech market giants make investments of millions. Backup/Data Protection is a key area when we talk about data retention and data recovery. We have big giants involved who have made this possible by developing a variety of data-protection tools. These data-protection techniques have been utilised in both physical and virtual environments.


These backup techniques are basically of two types :


1. Image Backup

2. Client Backup


The earliest kind of backup configurations were client backups. Traditional backup methods work like this by storing redundant data over and over again. Because of this, client backup installation had various performance degradation issues. The below issues were rectified by a technique called Image Backups. In this technique there was improvisation in data protection by the storage of only the changed storage block, instead of everything as in the  client backup technique. Tremendous improvement in the performance of the VMS was recorded by using image backup technique. There was also less congestion in the network bandwidth.


In Virtual Environments the Major Tools used for Image Backup Technique are as stated below


  • VMware Vsphere Data protector

  • IBM Tivoli Manager

  • Avamar Proxy Server


Introduction to  VMware Vsphere DataProtector (VDP):


  • Robust ,Simple to deploy disk-based backup and recovery technique.

  • It enables centralised and efficient management of backup jobs while storing backups in deduplicated storage locations.

  • VMware vSphere Web Client interface is used to select, schedule, configure, and manage backups and recoveries of virtual machines.

  • The Vsphere data protector creates a snapshot quiesced snapshot of the virtual machine and deduplication is performed with every backup operation.

  • It uses Change Block Tracking (CBT) technique which is Vmkernel function, keeping a track of storage blocks of virtual machines as they change over time. VMkernel  keeps a track of block changes on virtual machines, this enhances the backup process for applications.

  • It uses VMware storage API’s used for Data Protection as well enables centralized backup of a VM machine without causing any disruption.

  • The VDP Appliance is a purpose built virtual appliance for vSphere data protection.



Installation of Vsphere Data Protector:


Software Requiremnets:

VDP 5.5 requires the following software:

  • VMware vCenter Server: Version 5.1 or later

  1. vCenter Server Linux or Windows.

NOTE: Backing up more than 2 TB VMs on Windows operating systems is not supported. This limitation does not exist on Linux operating systems.

  1. Web browsers must be enabled with Adobe Flash Player 11.3 or higher to access the vSphere Web. Client and VDP functionality


  • VMware ESX/ESXi (the following versions are supported)

  1. ESX/ESXi 4.0, 4.1,ESXi 5.0, ESXi 5.1, ESXi 5.5

Pre-Installation Configurations:

  • “DNS Configuration”

  • “NTP Configuration”

  • “User Account Configuration”

  • “vSphere Data Protection Best Practices”


Installation of Vsphere Data Protector:


The installation is basically completed in two steps :-

  • “Deploy the OVF Template”

  • “Configuring the VDP Appliance System Settings”


Deploy the OVF Template:-



1. From a web browser, access the vSphere Web Client.

2. Log in with administrative privileges.

3. Select vCenter > Datacenters.

4. On the Objects tab, click Actions > Deploy OVF Template.

5. If prompted, allow and install the VMware Client Integration Plug-in.

6. Select the source where the VDP Appliance is located. By default the File name dialog is set to OVF

Packages (*.ovf). From the drop-down box to the right of File name, select OVA Packages (*.ova).

7. Navigate to the location of the VDP Appliance .ova file. Confirm that you select the appropriate file for

the datastore. Click Open.

8. After the VDP Appliance .ova file is selected, click Next.

9. Review the template details and click Next.

10. On the Accept EULAs screen, read the license agreement, click Accept, and then click Next.

11. On the Select name and folder screen, enter the name for the VDP Appliance (this must match the entry configured on the DNS Server) and click on the folder or datacenter in which you want it deployed. The VDP Appliance Name should not be changed after installation. Click Next.

12. On the Select a resource screen, select the host for the VDP Appliance and click Next.

13. On the

Select Storage screen, select the virtual disk format and select the location of the storage for the VDP Appliance. Click Next.

14. On the Setup networks screen, select the Destination Network for the VDP Appliance and click Next.

15. In the Customize template screen, specify the Default Gateway, DNS, Network 1 IP Address, and

Network 1 Netmask. Confirm that the IP addresses are correct and match the entry in the DNS Server.

Setting incorrect IP addresses in this dialog box will require the .ova to be redeployed. Click Next.

NOTE: The VDP Appliance does not support DHCP; a static IP address is required.

16. On the Ready to complete screen, confirm that all of the deployment options are correct. Check Power on after deployment and click Finish.

vCenter deploys the VDP Appliance and boots into the install mode. You can monitor Recent Tasks to determine when the deployment is complete.


Configuring the VDP Appliance System Settings:


Note: That the OVF template has been deployed



1. From a web browser, access the vSphere Web Client.

2. Log in with administrative privileges.

3. Select vCenter Home > vCenter > VMs and Templates. Expand the vCenter tree and select the VDP


4. Open a console session into the VDP Appliance by right-clicking the VDP Appliance and select Open

Console.In the console, the URL and the steps required to configure the VDP display.

5. Enter the required information in the console.

6. Open a web browser and type:


The VDP Welcome screen appears.

7. Click Next.

8. The Network settings dialog box appears by default. Specify (or confirm) the following network and

server information for your VDP Appliance:

a IPv4 Static address

b Netmask

c Gateway

d Primary DNS

e Secondary DNS

f Hostname

g Domain

9 Click Next.

10 The Time Zone dialog box appears. Select the appropriate time zone for your VDP Appliance, and click Next.

11 The VDP credentials dialog box displays. For VDP credentials, type in the VDP Appliance password, and then verify the password by retyping it. This will be the universal configuration password. Specify a password that contains the following:

Nine characters

At least one upper case letter

At least one lower case letter

At least one number

No special characters

12. Click Next.

13. The vCenter registration dialog box appears. Specify the following:

a vCenter username—If the user belongs to a domain account then it should be entered in the format


CAUTION If an SSO admin user is specified as the vCenter username in the format <username@vsphere.local>;,

tasks related to VDP operations do not appear in the vCenter Recent Tasks pane of the vSphere Web Client.

For tasks to appear in the Recent Tasks pane, specify the SSO admin user in the format


b vCenter password

c vCenter hostname (IP address or FQDN)

d vCenter port

e If disabled, click the Use vCenter for SSO authentication check box for SSO authentication.

NOTE: Leave the Use vCenter for SSO authentication check box enabled if your vCenter has SSO embedded in the vCenter server appliance.

14. Click Test connection.


NOTE: If on the vCenter registration page of the wizard you receive the message “Specified user either is not a dedicated VDP user or does not have sufficient vCenter privileges to administer VDP.”

If you follow the steps then your installation of Vsphere Data Protector should go without a hitch.



CherryTree Review: The Rich Tree Notes Application

CherryTree is a notes-taking application which organizes your notes into a hierarchical tree, has support for text formatting, and is written in GTK2/Python. Lately this application has got a lot of attention due to rich features and frequent updates. It also comes by default in distributions such as MakuluLinux MATE Edition.


First let me start by talking a bit about the way CherryTree organizes its notes. First of all, the notes are kept in a tree-like hierarchy in the left panel on the main window. Here, you can set so-called “nodes” and “sub-nodes” to create and archive your notes. Each node has a few configurable properties. For example, for each node you can change its name, or you can select its type: Rich Text, plain text or automatic syntax highlighting. The syntax highlighting feature has support for many programming languages. Additionally, you can use tags for each note or make a node read-only, so it can’t be modified.


Full article


Advanced Gtk+ Sequencer 0.4.2

Advanced Gtk+ Sequencer 0.4.2-12

Comes with many improvements, so far many memory leaks are fixed further it runs mostly stable. Caution GNU/Linux may hang up after a short while.

Download Latest


Advanced Gtk+ Sequencer is configurable by preferences dialog. It has autosave functionality

  • save or open Advanced Gtk+ Sequencer XML files with XPath support
  • add or remove audio engines with adjustable audio channels and pads
  • link channels with property dialog output panel, mixer, drum and matrix sequencer, soft synth and soundfont2 player
  • piano roll with basic notation editing supporting copy & paste
  • live adjustable BPM
  • LADSPA support (certain plugins may crash application)
  • live export to WAV

Updated API Reference

The API reference manual was just updated in front of release 0.4.2. Allthough the other documentation wasn't it can even help you get an understanding of how `ags` works.

Visit API reference manual.

Configuration options

Advanced Gtk+ Sequencer safes its configuration in:


Advanced Gtk+ Sequencer - Screenshot


ShellShock vulnerability

ShellShock is a the vulnerability in bash, a most commonly used shell (command line interpreter) programmer in Linux.

Read more at PageFrames


8 Tips to Solve Linux & Unix Systems Hard Disk Problmes Like Disk Full Or Can’t Write to the Disk

Can't write to the hard disk on a Linux or Unix-like systems? Want to diagnose corrupt disk issues on a server? Want to find out why you are getting "disk full" messages on screen? Want to learn how to solve full/corrupt and failed disk issues. Try these eight tips to diagnose a Linux and Unix server hard disk drive problems. 

Read more: 8 Tips to Solve Linux & Unix Systems Hard Disk Problmes Like Disk Full Or Can’t Write to the Disk


resolv_wrapper 1.0.0 - the new cwrap tool

The cwrap project released a new preloadable wrapper which can be used for
nameserver redirection or DNS response faking. The tool is named
resolv_wrapper and can be used in testing environment to route DNS queries
to a real nameserver separate from resolv.conf or fake one with simple config
file. The tool is supported on several platforms, including Linux, Solaris and

If you want to write a unit test, which requires to acquire a Kerberos ticket
using kinit before, you would need to be able to locate the Kerberos KDC
looking up a SRV records in the nameserver. resolv_wrapper could be used make
sure the kinit is working correctly by talking to your nameserver or by faking
the DNS response. It wraps the functions provided by like
res_query() and res_search().

You can download resolv_wrapper here.


PostgreSQL features that may interest you

Range Types

Ever had start_date and end_date columns? Have you written queries like this to find overlapping date ranges?:

… WHERE ('2014-07-15 15:20:00’ >= start_date
AND '2014-07-15 15:20:00’ < end_date)
OR ('2014-07-15 15:50:00’ > start_date
AND '2014-07-15 15:50:00’ <= end_date);

Well this isn’t necessary in PostgreSQL

CREATE TABLE appointments (
id serial primary key,
appointment tstzrange,
details text);
INSERT INTO appointments (appointment, details)
VALUES ('[2014-07-15 15:00:00,2014-07-15 15:30:00)’, 'Dentist’);
FROM appointments
WHERE appointment && '[2014-07-15 15:20:00, 2014-07-15 15:50:00)’::tstzrange;

Square brackets mean “including”, round brackets mean “from/to but not including”. So the appointment is from 15:00, and up to, but not including, 15:30. We want it this way because if we had an appointment at 15:30, we don’t want it overlapping the previous appointment at all. The && operator means "overlaps".



Ever had several items that you wanted to store together, but had to create a column for each one? In PostgreSQL any type (even user-created ones) can be specified as an array type by adding "[]" to the end of the type name. (note: the ISBN13 type shown below is part of the core extension "lsn")

CREATE TABLE books (isbn ISBN13, title TEXT, author text, tags TEXT[]);INSERT INTO books (isbn, title, author, tags)
('978-0575081406','The Name of the Wind','Patrick Rothfuss', ARRAY['fantasy','fiction','epic']),
('978-0753827666','Gone Girl','Gillian Flynn',ARRAY['mystery','fiction']),
('978-0575079755','The Lies of Locke Lamora','Scott Lynch', ARRAY['fantasy','epic']);

FROM books
WHERE tags @> '{fantasy}';

       isbn        |          title           |      author      |          tags        
978-0-575-08140-6 | The Name of the Wind | Patrick Rothfuss | {fantasy,fiction,epic}
978-0-575-07975-5 | The Lies of Locke Lamora | Scott Lynch | {fantasy,epic}
(2 rows)

Function Languages

PostgreSQL supports not just SQL and plpgsql as function languages, but many others including Perl, Python, Bash, TCL, Sh, R, Java, Javascript, Javascript V8, LOLcode, Scheme, PHP, Ruby, Lua, or any other language you wish to add:

CREATE OR REPLACE FUNCTION divide_python(a numeric, b numeric) RETURNS numeric AS $$
if b > 0:
return a / b
$$ LANGUAGE plpython3u;

CREATE OR REPLACE FUNCTION divide_perl(numeric, numeric) RETURNS numeric AS $$
if ($_[1] > 0) {
return $_[0] / $_[1];
$$ LANGUAGE plperl;


Foreign Data Wrappers

PostgreSQL can connect to pretty much any external data source:

-- Create the file_fdw extension so we can read in files from disk.
-- Create the server definition which is straight-forward for files
-- Now create the definition of the foreign table that will read in the file when queried.
CREATE FOREIGN TABLE report_file (report_date date, item text, count int) SERVER file
OPTIONS (FILENAME '/tmp/report.csv', HEADER 'true', FORMAT 'csv');
-- Let's query it as if it were just a regular table
SELECT * FROM report_file ORDER BY count desc;
 report_date | item | count
 2014-10-15 | Books | 15
 2014-10-15 | Glasses | 5
 2014-10-17 | Laptops | 3
(3 rows)




Try the New Makulu Cinnamon Debian Edition: Gaming-Ready, Cinnamon at Its Peak

In the past I have reviewed MakuLinux MATE Edition, which came with a very polished and beautiful interface, but also bundled in the ISO a big number of applications to be installed. At the time the MATE edition made a very good impression on me, so I kept a close eye on the development of Makulu.


So now it’s time to look at the brand new MCDE – MakuluLinux Cinnamon Debian Edition – which features Cinnamon 2.2, is based on Debian Testing and comes ships with components to make it a great choice for gamers, beautiful appearance customization themes and wallpapers, a custom control center and many more features.


Read more


TAMASHARE : Instant Sharing

Tamashare is the first application for instant sharing.
With Tamashare, you can save time by inviting the participants directly to a private and secure sharing room
The file appearing in the sharing room is instantly visible to all the participants
Everyone can talk with you about the document thanks to the display of the hands of users, an audio conferencing module and annotation tools.

Tamashare is a free application available soon for all devices.

You can download here : TAMASHARE DOWNLOAD FOR FREE

Or watch our teaser :



Page 12 of 155

Upcoming Linux Foundation Courses

  1. LFS201 Essentials of System Administration
    12 Jan » 30 Mar - Online Self-Paced
  2. LFD411 Embedded Linux Development
    30 Mar » 03 Apr - Chelmsford - MA
  3. LFS540 Linux KVM Virtualization
    06 Apr » 09 Apr - Austin - TX + Virtual

View All Upcoming Courses

Who we are ?

The Linux Foundation is a non-profit consortium dedicated to the growth of Linux.

More About the foundation...

Frequent Questions

Join / Linux Training / Board