These are my links for 31 ott 2014 through 1 nov 2014:
check_jvm – Nagios Exchange – JvmInspector is standalone tool + Nagios wrapper plugin (check_jvm) that dumps various properties from locally running JVMs. This information includes: * Heap & non-heap memory * Running threads * Loaded classes * Running java version, paths & arguments * On App servers only: Container server name & total active sessions (tested & supported app servers are tomcat5+ and jboss4+) JvmInspector doesn't need local or remote JMX network socket. It directly attaches to JVM's PerfData, so it MUST be started with the same USERid as the target JVM!
Raspberry Pi VPN Gateway – Netflix finally arrived in Germany, but guess what? It's library is heavily limited in comparision to the US one and if you like TV series as much as I do, you don't want to wait until they eventually release it year(s) later for us german users. Maybe you've heard recently of Anonabox — a small device with two ethernet ports that you can plug in front of your router and everything behind the device is routed through Tor (side note: turned out to be a scam and got pulled from Kickstarter in the end). However, it made me come up with an idea: Instead of having a Tor-box, I want a VPN-box that is connected to my PrivateInternetAccess VPN. If I'm in need of a VPN connection I just switch the WiFi network and I'm good to go. This way I can easily watch US content from Netflix as well as unblock location restricted content like YouTube, even with my iPhone or Xbox[…]
My Tmux Setup on unwiredcouch.com – I've been using tmux as my main terminal multiplexer for about 3 years now and have refined my configuration over time to fit my daily workflow. Which is usually a mix of writing code, chef recipes, remote login into different servers and various shell tasks. This is a flexible setup that doesn't concentrate too much on doing a specific thing or replacing an IDE inside of tmux.
debsecan – The debsecan program evaluates the security status of a host running the Debian operation system. It reports missing security updates and known vulnerabilities in the programs which are installed on the host. debsecan accesses the dpkg database and obtains a list of installed packages and their versions. This list is then evaluated against a feed of vulnerability information which ultimately comes from a database maintained by Debian's Testing Security Team . Various output formats are supported, including incremental reporting via email. Beginning with version 0.2, debsecan includes a script called debsecan-create-cron, which allows you to create a cron job which periodically sends you mail (once per day) when the security status of the system changes.
Barriers, Caches, Filesystems | monolight – With the recent proliferation of ext4 as the new “default” Linux filesystem there’s been much talk of write barrier support. The flurry of post-2.6.18 barrier related development in most storage subsystems has left some novice users and administrators perplexed. I hope I can clear it up a bit with this primer/refresher.
SMTP, testing via Telnet – FreeBSDwiki – When troubleshooting problems with SMTP service – your own, or others – it is frequently very helpful to be able to "speak" to the SMTP server directly, rather than going through a mail client which won't necessarily tell you exactly what the SMTP server is saying. You can easily do this with the telnet client. Note that many ISPs do not allow outbound connections on port 25 to any SMTP server but their own – if you get timeouts when trying to connect to port 25, you should try port 587, which is the standard ESMTP port. (Port 587 connections normally require SMTP AUTH, which is covered below.)
These are my links for 9 lug 2013 through 11 lug 2013:
AppArmor – Ubuntu Wiki – AppArmor is a Mandatory Access Control (MAC) system which is a kernel (LSM) enhancement to confine programs to a limited set of resources. AppArmor's security model is to bind access control attributes to programs rather than to users. AppArmor confinement is provided via profiles loaded into the kernel, typically on boot. AppArmor profiles can be in one of two modes: enforcement and complain. Profiles loaded in enforcement mode will result in enforcement of the policy defined in the profile as well as reporting policy violation attempts (either via syslog or auditd). Profiles in complain mode will not enforce policy but instead report policy violation attempts.
SmoothSec – Smooth-Sec is a fully-ready IDS/IPS (Intrusion Detection/Prevention System) Linux distribution based on Debian 7 (wheezy), available for 32 and 64 bit architecture. The distribution includes the latest version of Snorby, Snort, Suricata, PulledPork and Pigsty. An easy setup process allows to deploy a complete IDS/IPS System within minutes, even for security beginners with minimal Linux experience. [ via https://delicious.com/farmando ]
These are my links for 27 giu 2013 through 3 lug 2013:
Miniflux – Minimalist and Open Source News Reader – Miniflux is a minimalist and open source news reader. Features: Optimized for readability Very easy to use Minimalist design Fast Efficient No social network support No advertising and user tracking Privacy No data locking, host anywhere Web based Mobile ready Secure Translated into several languages Super simple installation Open source and free software [ via http://tinyapps.org/blog/nix/201307020700_miniflux.html ]
How to interpret the status of dpkg (–list)? | Programming in Linux – dpkg (debian package manager) is the package manager for Ubuntu (debian based distributions). dpkg can be used to install packages in Ubuntu. With dpkg, you can see the status of various packages like: the packages are currently installed the packages are removed the configuration files are present marked for removal Let’s explore the output of dpkg –list.
Jugnu Life :-): How to install Tomcat in Linux (Ubuntu) – To install Tomcat we need Java to be installed in the system. If you want to know how to install Java on Linux you can refer this earlier post on the same. We can install Java either using packages (apt , yum) or manually. This post explains how to do it manually. The main advantage of doing it manually is that all the tomcat files are in one location. The automated installation will spread the setup files across various locations. It places the Tomcat configuration files at various non standard places.