Archivio tag: aix

Bookmarks for 26 ago 2014 through 27 ago 2014

These are my links for 26 ago 2014 through 27 ago 2014:

  • Regular Expressions – Regular expressions ("regexes") are supercharged Find/Replace string operations. Regular expressions are used when editing text in a text editor, to: check whether the text contains a certain pattern find those pattern matches, if there are any pull information (i.e. substrings) out of the text make modifications to the text. As well as text editors, almost every high-level programming language includes support for regular expressions. In this context "the text" is just a string variable, but the operations available are the same. Some programming languages (Perl, JavaScript) even provide dedicated syntax for regular expression operations.
  • MySQL active-passive cluster | Your IT goes Linux – We will use the iSCSI Lun defined in our iSCSI cluster as a shared storage and we will run MySQL in active-passive (fail-over) mode using Pacemaker and Corosync cluster engine. The cluster will have to connect to the iSCSI target, mount the iSCSI partition on one node and start a MySQL service which has all its data on this partition.
  • Perl – [...] Perl has horrors, but it also has some great redeeming features. In this respect it is like every other programming language ever created. This document is intended to be informative, not evangelical. It is aimed at people who, like me: dislike the official Perl documentation at http://perl.org/ for being intensely technical and giving far too much space to very unusual edge cases learn new programming languages most quickly by "axiom and example" wish Larry Wall would get to the point already know how to program in general terms don't care about Perl beyond what's necessary to get the job done. This document is intended to be as short as possible, but no shorter[...]
  • Linux Performance – This page links to various Linux performance material I've created, including the tools maps on the right, which show: Linux observability tools, Linux benchmarking tools, Linux tuning tools, and Linux observability sar. For more diagrams, see my slide decks below.
  • AIXchange: Useful Storage Links – Here's an assortment of really good storage-related articles — the majority of which are found on IBM developerWorks — that are worth your time. While some of them are a few years old, they still provide relevant information.

Bookmarks for 25 ago 2014 from 15:03 to 17:25

These are my links for 25 ago 2014 from 15:03 to 17:25:

  • Passwordless – A node.js/express module for token-based logins – Token-based authentication middleware for Express & Node.js [...] Passwords are broken. Inspired by Justin Balthrop's article Passwords are Obsolete token-based one-time password (OTPW) authentication is faster to deploy, better for your users, and more secure. [...]
  • Mounty for NTFS – A tiny tool to re-mount write-protected NTFS volumes under Mac OS X Mavericks in read-write mode.
  • tinc wiki – tinc is a Virtual Private Network (VPN) daemon that uses tunnelling and encryption to create a secure private network between hosts on the Internet. tinc is Free Software and licensed under the GNU General Public License version 2 or later. Because the VPN appears to the IP level network code as a normal network device, there is no need to adapt any existing software. This allows VPN sites to share information with each other over the Internet without exposing any information to others.
  • AIXchange: More Resources for AIX Newbies – As I've noted previously, there are more newcomers to the AIX platform than you might imagine. A company may acquire an AIX system through a merger or replace an old Solaris or HP-UX box with a current IBM Power Systems model. As a result, one of their IT pros suddenly becomes the AIX guy. So, now what? How does an AIX newbie get up to speed with virtualization and AIX?

Bookmarks for 20 dic 2013 through 21 dic 2013

These are my links for 20 dic 2013 through 21 dic 2013:

Bookmarks for 19 set 2013 through 25 set 2013

These are my links for 19 set 2013 through 25 set 2013:

  • AIXchange: Restricting FTP Access (AIX) – A customer was trying to restrict user access to a particular directory on an AIX system when FTP was used. We came across two good options.
  • FBI Tor Malware Analysis – [...] In April 2013, a piece of malware was found embedded in Freedom Hosting's darknet server that would exploit a security hole in a particular web browser and execute code on the user's computer. This code gathered some information about the user and sent it to a server in Virginia and then crashed – it had no obvious malicious intent that is so characteristic of malware. It was therefore theorised that the FBI, who have offices in Virginia, and who have 'form' for writing malware, may have authored it – this now appears to be true. [...]
  • Samba4 and OpenChange on a Debian or Ubuntu server – Samba4/Openchange suite promises to provide a complete Active Directory© domain controller with an alternative to a Microsoft Exchange server. Gracefully to the rewrite of MAPI protocol, Outlook can now seamlessly connect to a Linux server for synchronizing and sharing calendars, contacts, tasks and mails.