All Posts Tagged Tag: ‘Linux’
I was interested to see that RHCE (Red Hat Certified Engineer) was listed in slot 3 of certifications IT professionals want to get.
Most Linux and Unix programs are written in C. When you download source for a project, it will often be C or C++ source code. You don’t necessarily need to know a darn thing about C or anything else to compile the source if you aren’t changing it. It may be helpful for you to understand a bit if you are having problems with the compile, but even that isn’t really necessary.
After completing their purchase of mobile phone company China MobileSoft, PalmSource indicated a Linux version of their software would soon be available. The acquisition allows PalmSource to concentrate on other mobile technologies besides smartphones and PDAs.
According to a recent report from a research group, Microsoft Chief Executive Steve Ballmer at an Asian Government Leaders Forum in Singapore claimed that Linux violates more than 228 patents.
Any website comprises the following – Domain name, Webspace, Webpages.
Linux Networx has partnered with Novell to create a High Performance Computing (HPC) Certification Center located at Linux Networx to help Independent Software Vendors (ISV) certify their applications on Novell’s SUSE LINUX Enterprise Server for use in clustered environments.
Microsoft Chief Executive Steve Ballmer sent an email to its IT executive e-mail list of customers around the world yesterday fighting back against Linux.
Recently I had a hard drive fail. It was part of a Linux software RAID 1 (mirrored drives), so we lost no data, and just needed to replace hardware. However, the raid does requires rebuilding. A hardware array would usually automatically rebuild upon drive replacement, but this needed some help.
This first ever Yankee Group workshop will examine whether or not Linux delivers significantly better performance, reliability, manageability and ultimately lower total cost of ownership (TCO) and faster return on investment (ROI) than the rival Windows and Unix operating system platforms.
Linux programs can now exchange data in real time with a wide range of Windows programs, across a network or the Internet.
Linux (and its close relation Unix) and Windows 2000 (and its close cousin Windows NT) are types of software (known as operating systems) that web servers use to do the kind of things that web servers do. You do not need to know any real detail of either to make a decision as to which you need but here a few guidelines.
Proginet announced today the availability of SecurPass for Linux, to address the password management security needs of the millions of companies around the world who have or intend to deploy the rapidly growing Linux system.
MontaVista Software and Amstrad PLC today announced that MontaVista Linux is the chosen operating system for Amstrad’s recently introduced “E3” email-enabled home videophone.
Broadcom’s SATA-based RAID Controller Cards Now Available for Red Hat and Fedora Linux OS Platforms.
Novell today announced the upcoming public beta software availability of Novell Open Enterprise Server, incorporating the best from leading commercial and open source networking platforms along with integrated management tools, identity-based services and an entire ecosystem of support backed by Novell to meet enterprise-class computing needs.
Novell announced the establishment of its Porting and Migration Network, an initiative designed to help customers and software and hardware partners make the move to SUSE LINUX Enterprise Server quickly and cost effectively.
Novell today announced the immediate availability of Novell ZENworks 6.6 Linux Management, a complete Linux* software management system that helps cut IT costs by dramatically reducing the required overhead to manage Linux software package updates.
Gupta Technologies has released an innovative new database that will allow an easy transition of applications from a Microsoft Windows environment to the Linux platform.
Product Enables 99.999% Availability of Telecom and Enterprise Networking Applications Using Carrier-Grade Linux on Intel Architecture-Based Platforms.
Versata today announced general availability of the Versata Logic Server, version 5.6.2, for the IBM WebSphere Application Server on IBM eServer iSeries hardware running Linux.
Logicworks today announced the availability of Managed Oracle 10g for Linux as part of its managed database hosting services.
HP today expanded its thin client lineup with the introduction of the HP Compaq Thin Client t5515 – the first of the t5000 series to offer the Linux operating system.
Last time I showed you how to exchange and verify public PGP keys with an individual. After you’ve verified a user’s key (KeyID, bits, type, fingerprint, and user’s actual identity) you should sign their key.
Verification is part of any security system. SSH, FTP, POP, and IMAP servers ask for your password before it lets you log into the machine, get your files, or snag your email. NTP can be configured to require keys before it’ll let you mess with it’s clock. CIFS requires a password or kerberos tickets before granting you access to shares.
GnuPG and other PGP implementations allow you to encrypt (scramble the data so only intended recipients can read it) and/or sign (provide proof that the data has been unaltered in transit). As you should remember, PGP keys are made up of two parts, a public key and a private key. The public key can (and in most cases should) be available to anyone – there’s no harm in allowing it out to the entire world. The private key should be kept somewhere secure, protected with a strong passphrase.
File and mail security is easy to achieve with the right tools. PGP has proven itself the leader, and GnuPG is the tool of choice in the Linux world.
Linux has a powerful task scheduler called Cron. Cron will allow you to run commands automatically at times specified by you. Cron is similar to the task scheduler you find in Windows. To keep track of the schedules and tasks it has to run, Cron requires a file called Crontab (CRON TABle). All the Cron schedules and tasks should be stored in this table. The Crontab files cannot be directly edited. You can add or delete entries in the crontab file using the crontab command.
What are your IT Career and Certification expectations for year 2004? While certifications can give you an edge, going for just any certification doesn’t help. What is your career focus? New or old activities, what is your focus? New does not always translate to good or wise. It makes sense to review and analyze trends that will affect your career in 2004.
I have a very good memory. I remember most of my client’s passwords (there are a few I forget regularly for no reason that I can understand, but I really do know most), I remember telephone numbers, and of course I know my own passwords. That last isn’t as easy as it might sound, because I have quite a few different systems and each has its own password, but though I might use the wrong one now and then, I’ll get it on the second or third try.
Running Programs in Response to Sniffed DNS Packets – Stealthily Managing Iptables Rules Remotely, Part 2
Last time we set up a Perl script that would use the Net::Pcap module to sniff the network and print information about DNS requests to standard output. The output looks like this
sourceipaddr -> destipaddr: dnshostname
This week, we’ll take a look at a successful and somewhat puzzling machine compromise. The machine in question was a production machine that had been up and running for about a year – one of those machines that had so much on it that you’re afraid to ever reboot it, lest something not come back up.
Many modern systems provide a way to watch a directory for events (new files, reading the directory, modification of a file in the directory, etc.). This facility can be done in various ways, from providing hooks in the filesystem code itself to something that watches for inode changes. Linux and BSD have several possibilities in that regard, including dnotify, changedfiles, and watch.
Warning: This article contains strong language and unpopular opinions. Reading of this material by Windows advocates may cause severe gastric distress followed by a desire to strike the author sharply about the head. As the author does not enjoy being pummeled, such persons are kindly requested to return whence they came and do something else.
People consider the GNU or free software and open source software to be unsafe and are supposed to easily compromised because their source code are readily available,which isn’t correct. This article is specifically related for the security of the GNU Linux Operating system and will help the person for enabling the security parameters for added safety.
These are classic Unix permissions. However, many modern Unixes support extended attributes that go beyond this. We’ll look at one example of that later in the article. You also need to know that Unix and Windows permissions don’t map well to each other, so if you are using something like Samba or Visionfs , you need to understand how permissions will be shown and honored. Some examples of that are shown later.
Virtual PC for Windows, Mac (OS 9 or X) and OS/2 creates virtual machines that can run multiple Windows versions. This is particularly advantageous for Mac users, but even ordinary PC users can find value in this. It’s easy to have Linux, Windows 98, Windows ME, 2000, XP Home and XP professional all on the same machine.
The /proc filesystem is one of Linux’s great features, and this article gives you a thorough grounding in some of its most useful aspects. With it, you can administer many details of the operating system without ever having to shut down and reboot the machine, which is a boon for those who need to keep their systems as available as possible.
Building a reliable, full-featured broadband router can be very easy and cost-efficient. This article is about building one for routing a LAN to the Internet with NAT (Network Address Translation — Linux users also call it as IP Masquerading) using an old computer and a Linux micro-distribution designed to have very low hardware requirements. We’ll end up having a very simple and stable system, yet featuring e.g. iptables based stateful firewalling and remote administration.
In this article we’ll describe how to connect two PC via SLIP protocol using a null-modem cable. After this procedure, the two PCs will be connected and the IP protocol will be available for interworking, so using IP applications (e.g. telnet, ftp, ping) will be possible.
Almost all modems manufactured today are software modems, usually referred to as “winmodems”. Even though we pay a lot for a winmodem, they are cheap to manufacture because they use very little electronics. The functions that should be performed in hardware are emulated by software. This places an extra processing burden on your computer’s CPU. Winmodems will not work with Linux unless you can locate a special “Linmodem” driver.
Here we go again. I decided to write another article concerning some overall security aspects of installing and running linux. To keep it short and simple, here are some good pointers to enhancing your system’s security. But remember, there’s no absolute security, so keep your eyes open, subscribe yourself to a few good mailing lists, and keep your software up-to-date.
The Intel Xeon processor introduces a new technology called Hyper-Threading (HT) that, to the operating system, makes a single processor behave like two logical processors. When enabled, the technology allows the processor to execute multiple threads simultaneously, in parallel within each processor, which can yield significant performance improvement. We set out to quantify just how much improvement you can expect to see.
Emacs is one of the most popular and powerful text editors used on Linux (and Unix). It is second in popularity only to vi. It is known for it huge feature set, ability to be easily customized, and lack of bugs. It’s large feature set and ability to be customized actually are the result of how Emacs was designed and implemented. Without going into all the details, I’ll simply point out that Emacs isn’t “just an editor”. It is an editor written mostly in the programming language Lisp.
Debian has a package manager (DPKG) that resolves dependency problems automatically. It help us to automatically keep up to date programs looking for new versions on the internet, resolving and completing the files and libraries dependencies which a package requires, making system administration easy and keeping us up to date with the new security changes. It also shows some important and substantial security features: it doesn’t have commercial goals, also doesn’t obey mercantile urgencies, It has a good pursuit of errors, problems are fixed in less than 48 hours and it’s priority is to develop a complete and reliable operating system.
Performance breakthroughs seem to come in two varieties: easy and hard. That’s no platitude; the boundary between the two is surprisingly clear.
When you hear about some — the easy ones — you clap your hands and say, “wow” or “of course” or “slick.” Although in some cases it has taken considerable genius to realize their first application, they’re easy to understand.
AS A MARRIAGE OF CONVENIENCE the WinTel alliance used to work pretty well. Intel lived up to Moore’s Law by building ever larger and more complex chips, while Microsoft executed Gate’s Law by churning out ever more bloated and serially incompatible versions of its software.
Malicious local user could gain full privileges by exploiting ‘ptrace’ hole. A developer who helped write the original Linux kernel is warning of a flaw in some versions of the operating system that could allow a malicious local user to gain root control of a Linux computer.
Anything Microsoft can do…
Motorola Inc. grabbed a lot of headlines in February when it announced the world’s first mobile phone that runs Linux, however, developers won’t be able to create Linux applications and run those on the phone because Linux is not secure enough, Motorola spokesman David Rudd said Wednesday.
In our last issue, we looked at what data you need to collect before attempting to build a Linux kernel. This is very important information so you may want to take a look at the first article if you are a little rusty. I have also written an article about using the command line in Linux that may be helpful for you.
The firm I work for had a fax system integrated in the corporate e-mail platform, Microsoft Exchange, for sending and receiving. One day after a software upgrade, the system broke. We needed to find something with the equivalent functionality but with the following conditions:
raidtools has been the standard software RAID management package for Linux since the inception of the software RAID driver. Over the years, raidtools have proven cumbersome to use, mostly because they rely on a configuration file (/etc/raidtab) that is difficult to maintain, and partly because its features are limited. In August 2001, Neil Brown, a software engineer at the University of New South Wales and a kernel developer, released an alternative. His
mdadm (multiple devices admin) package provides a simple, yet robust way to manage software arrays.
mdadm is now at version 1.0.1 and has proved quite stable over its first year of development. There has been much positive response on the Linux-raid mailing list and
mdadm is likely to become widespread in the future. This article assumes that you have at least some familiarity with software RAID on Linux and that you have had some exposure to the raidtools package.
A short time ago I wrote an article discussing resources for Red Hat 8.0. Widely touted as a more “user-friendly” version of Linux, I gave it a whirl and intended to share my views with you. Instead, I will respond to some of the many, many questions readers sent in. Thank you all for your feedback! You’ve raised some very good issues.
If you’re like me, you’ve considered eliminating Windows from your computer at some point. The upgrade scheme is confusing, and there’s an endless stream of hacks, viruses, worms, and exploits that target Windows computers exclusively.
Linux, by comparison, appears to be more stable. It seems to require less maintenance, and there aren’t any legal strings attached to it. It does, however, have a “geeks only” reputation that scares away many novices early on. Recently, Red Hat, a Linux software company, has made an effort to change that techs-only image.
Open-source (free) software is nothing new to the back end of business computing – chances are good your enterprise runs Linux servers that send email, control print jobs, and serve your company website internally and to customers. These non-proprietary software not only save money but keep hackers at bay. Ask your tech folk what you’re running, and, more importantly, why.
Most of you know that although I am certified under Microsoft products, I am an advocate of Linux. Linux and the BSDs (that sounds like a bad rock band– and here they are for your listening pleasure, Linux and the BSDs…) are consistently gaining ground in areas that have been dominated by proprietary operating systems. It is for this reason that I would like to make a suggestion. If you have no experience with Linux and/or BSD and you are serious about IT, now is the time to get some exposure to these alternative operating systems (OS).
Don’t Believe the FUD … or the Hype
While Microsoft spreads fear, uncertainty and doubt (FUD) over free software, the advocates often oversell community software on pure enthusiasm; there are truths on both sides. You can’t blame the geeks who laboured years without recognition, budgets or marketing: By their ideas alone, whole governments are now choosing their work over wares honed by the world’s richest vendors! Between the FUD and the hype, there are community alternatives for most business needs, but there are also rough edges.
MySQL has become increasingly popular in the last year because of its ease of use and price. Setting up a MySQL Server on a Windows machine is so easy you may not even realize it is there. Installing MySQL on a Linux machine isn’t quite as easy, but anyone with any experience installing programs on Linux wouldn’t have a problem. So, now that you have your server installed, how do you manage a multi-user environment? This is where your privileges come in.
Unfortunately, we have been unable to locate a major free ISP that supports Linux. Freewwweb used to be supported by almost all operating systems because it operated without the need for software, but they recently merged with Juno which does not support Linux at this time. Netzero is working on a Linux version as per a recent announcement, but it might not be ready for some time.