These are my links for 22 ott 2014 from 11:21 to 11:34:
F*EX – File EXchange – F*EX (Frams' Fast File EXchange) is a service to send big (large, huge, giant, …) files from a user A to a user B. The sender uploads the file to the F*EX server using a WWW upload form and the recipient automatically gets a notification e-mail with a download-URL.
KandanApp – An Open Source Alternative to HipChat and so much more. Get your own private Chat server in minutes, plus additional features. No credit card required. A fast, secure and stable solution based on Rails. Free and open-source Distributed under the AGPL License.
Get MogoChat – Beautiful team chat app written in Elixir & Ember.js
Ind.ie — Pulse – Pulse Freedom in sync Pulse (previously Syncthing) replaces proprietary sync and cloud services with something open, trustworthy and distributed. Your data is your data alone and you deserve to choose where it is stored, if it is shared with some third party, and how it's transmitted over the Internet. Free and Open Software. All source code is available on GitHub. What you see is what you get, there is no hidden funny business. Pulse Source Code For Mac, Windows, Linux, BSD, and Solaris Secure & Private, Free & Open, Easy to Use
Enterprise/Authentication/sssd – Ubuntu Wiki – The sssd authentication in Ubuntu works pretty decently. You can use it basically with any directory-style backend, including OpenLDAP, Kerberos, RedHat's FreeIPA and Microsoft's Active Directory. The good part about sssd is that it can be used to log into multiple directory services, so if you have some users in one directory, and the the rest in a different place, this works pretty decently in sssd. You can use it for single-server deployments with plain LDAP with servers or workstations (where you could as well go with pam-ldap and nss-ldap), but also, or especially for more sophisticated setups.
These are my links for 17 ott 2014 through 20 ott 2014:
microHOWTO: Configure Apache to use Kerberos authentication – To configure Apache to use Kerberos authentication Kerberos is an authentication protocol that supports the concept of Single Sign-On (SSO). Having authenticated once at the start of a session, users can access network services throughout a Kerberos realm without authenticating again. For this to work it is necessary to use network protocols that are Kerberos-aware. In the case of HTTP, support for Kerberos is usually provided using the SPNEGO authentication mechanism (Simple and Protected GSS-API Negotiation). This is also known as ‘integrated authentication’ or ‘negotiate authentication’. Apache does not itself support SPNEGO, but support can be added by means of the mod_auth_kerb authentication module.
How to create a bootable USB stick on OS X | Ubuntu – [...] Note: this procedure requires that you create an .img file from the .iso file you download. It will also change the filesystem that is on the USB stick to make it bootable, so backup all data before continuing [...]
thomastk/kunjumon – Kunjumon is a framework that can be used to create plugins for Nagios monitoring system, without writing any new code. The plugins thus created are robust, and, can monitor complex scenarios by querying data from multiple databases. While efforts to build such plugins would require considerable scripting work, using Kunjumon framework, a a plugin that pulls input data from databases can be implemented by defining it in XML format, and, there is no need to write any code to support it. The Kunjumon framework has been tested on all the Linux platforms, and against MySQL, Postgres, Oracle and Microsoft SQL Server. However, in general, it would work with any ODBC interface configured on the Nagios host to access a data repository.
OpenNetAdmin – OpenNetAdmin is a system for tracking IP network attributes in a database. A web interface is provided to administer the data, and there is a fully functional CLI interface for batch management (for those of you who prefer NOT to use a GUI). There are also several backend processes for building DHCP, DNS, router configuration, etc.
These are my links for 18 mar 2014 through 21 mar 2014:
tune apache peformance using mpm prefork module – There could be many reasons why your website performance is poor, one of them can possibly be that Apache is not coping with the load. Below you’ll find ready to consume configuration to make Apache performance better using the Apache MPM prefork module.
check-httpd-limits – Check Apache Httpd MPM Config Limits – Google Project Hosting – check_httpd_limits.pl compares the size of running Apache httpd processes, the configured prefork / worker / event MPM limits, and the server's available memory. The script exits with a warning (or error message) if the configured limits exceed the server's available memory. The script does not use any 3rd-party perl modules, unless the –save/days/max command-line options are used, in which case you will need to have the DBD::SQLite module installed. It should work on any UNIX server that provides /proc/meminfo, /proc/*/exe, /proc/*/stat, and /proc/*/statm files. You will probably have to run the script as root for it to read the /proc/*/exe symbolic links.
lozzd/Nagdash – What is Nagdash? Nagdash is the long awaited replacement of Naglite2. Written in PHP, it uses the Nagios-api, PHP and a sprinkling of jQuery and Bootstrap to provide a full screen, clean Nagios experience which is suitable either for a Dashboard/NOC screen, or simply a simple view to replace the Nagios UI.
Naemon Monitoring Suite – Naemon is the new monitoring suite that aims to be faster and more stable, while giving you a clearer view of the state of your network.