Quantcast

Linux Articles

Versata Logic Server on IBM eServer iSeries Running Linux Now Available

Versata today announced general availability of the Versata Logic Server, version 5.6.2, for the IBM WebSphere Application Server on IBM eServer iSeries hardware running Linux.

Logicworks Announces Availability of Managed Oracle 10g for Linux

Logicworks today announced the availability of Managed Oracle 10g for Linux as part of its managed database hosting services.

HP Expands Thin Client Portfolio with First Linux Offering

HP today expanded its thin client lineup with the introduction of the HP Compaq Thin Client t5515 – the first of the t5000 series to offer the Linux operating system.

Use shared objects on Linux

Make shared memory work for you, not against you

File and Email Encryption with GnuPG (PGP) Part Six

Last time I showed you how to exchange and verify public PGP keys with an individual. After you’ve verified a user’s key (KeyID, bits, type, fingerprint, and user’s actual identity) you should sign their key.

File and email encryption with GnuPG (PGP) part five

Verification is part of any security system. SSH, FTP, POP, and IMAP servers ask for your password before it lets you log into the machine, get your files, or snag your email. NTP can be configured to require keys before it’ll let you mess with it’s clock. CIFS requires a password or kerberos tickets before granting you access to shares.

File and Email Encryption With GnuPG (PGP) Part Four

GnuPG and other PGP implementations allow you to encrypt (scramble the data so only intended recipients can read it) and/or sign (provide proof that the data has been unaltered in transit). As you should remember, PGP keys are made up of two parts, a public key and a private key. The public key can (and in most cases should) be available to anyone – there’s no harm in allowing it out to the entire world. The private key should be kept somewhere secure, protected with a strong passphrase.

File and Email Encryption with GnuPG (PGP) Part One

File and mail security is easy to achieve with the right tools. PGP has proven itself the leader, and GnuPG is the tool of choice in the Linux world.

Automating Tasks in Linux using Cron

Linux has a powerful task scheduler called Cron. Cron will allow you to run commands automatically at times specified by you. Cron is similar to the task scheduler you find in Windows. To keep track of the schedules and tasks it has to run, Cron requires a file called Crontab (CRON TABle). All the Cron schedules and tasks should be stored in this table. The Crontab files cannot be directly edited. You can add or delete entries in the crontab file using the crontab command.

IT Certification and Career Trends for 2004
· 2

What are your IT Career and Certification expectations for year 2004? While certifications can give you an edge, going for just any certification doesn’t help. What is your career focus? New or old activities, what is your focus? New does not always translate to good or wise. It makes sense to review and analyze trends that will affect your career in 2004.

Kerio Mail Server

The Kerio Mail Server is a cross platform ( Windows, Linux, and Mac OSX) mail server. I tested it on RedHat Linux 8.

Lost Root Password (Linux)
· 3

I have a very good memory. I remember most of my client’s passwords (there are a few I forget regularly for no reason that I can understand, but I really do know most), I remember telephone numbers, and of course I know my own passwords. That last isn’t as easy as it might sound, because I have quite a few different systems and each has its own password, but though I might use the wrong one now and then, I’ll get it on the second or third try.

Running Programs in Response to Sniffed DNS Packets – Stealthily Managing Iptables Rules Remotely, Part 2

Last time we set up a Perl script that would use the Net::Pcap module to sniff the network and print information about DNS requests to standard output. The output looks like this

sourceipaddr -> destipaddr: dnshostname

Nmap Version Detection Rocks

Most people have heard of Nmap, the ubiquitous portscanner and more, available at http://www.insecure.org/nmap/. Recently, a new version of Nmap was released with a new and frequently requested feature – version scanning.

The Wrong Way to Upgrade Your RPMs

Most Linux distributions use the RPM[1] format for their software packages. RPMs are managed by the rpm program, which typically lives at /usr/bin/rpm.[2]

The Mysteriously Persistently Exploitable Program

This week, we’ll take a look at a successful and somewhat puzzling machine compromise. The machine in question was a production machine that had been up and running for about a year – one of those machines that had so much on it that you’re afraid to ever reboot it, lest something not come back up.

Monitoring File or Directory Changes

Many modern systems provide a way to watch a directory for events (new files, reading the directory, modification of a file in the directory, etc.). This facility can be done in various ways, from providing hooks in the filesystem code itself to something that watches for inode changes. Linux and BSD have several possibilities in that regard, including dnotify, changedfiles, and watch.

In Defense of Unix (and Linux, of course)

Warning: This article contains strong language and unpopular opinions. Reading of this material by Windows advocates may cause severe gastric distress followed by a desire to strike the author sharply about the head. As the author does not enjoy being pummeled, such persons are kindly requested to return whence they came and do something else.

GNU Linux Security

People consider the GNU or free software and open source software to be unsafe and are supposed to easily compromised because their source code are readily available,which isn’t correct. This article is specifically related for the security of the GNU Linux Operating system and will help the person for enabling the security parameters for added safety.

Restricting Access by Time of Day

Problem
You want a service to be available only at certain times of day.

Encrypting Backups

Problem
You want to create an encrypted backup.