These are my links for 2 ott 2013 through 22 ott 2013:
Digital Attack Map – Digital Attack Map is a live data visualization of DDoS attacks around the globe, built through a collaboration between Google Ideas and Arbor Networks. The tool surfaces anonymous attack traffic data to let users explore historic trends and find reports of outages happening on a given day. [ via https://delicious.com/farmando ]
uProxy – What is uProxy? uProxy is a browser extension that lets users share alternative more secure routes to the Internet. It's like a personalised VPN service that you set up for yourself and your friends. uProxy helps users protect each other from third parties who may try to watch, block, or redirect users’ Internet connections. [ via https://delicious.com/farmando ]
Clustering with JBoss mod_cluster – jboss cluster – JBoss application server tutorials – Mod cluster is an http based load balancer which greatly simplify the setup of an http cluster. It ships as a set of modules which need to be installed on the httpd server and a Service Archive Library (.sar) which needs to be deployed on JBoss AS (It is built-in in JBoss AS 6/7). Compared with the former mod_jk, the new mod_cluster has the great advantage to accept a dynamic configuration of httpd workers. This can be done through an advertise mechanism where all httpd workers communicate lifecycle events (like startup or shutdown) thus leveraging dynamic configuration of nodes.
How to configure mod_cluster with JBoss ? « JBoss – Like mod_jk, mod_cluster is also a httpd based load balancer which uses a communication channel to forward requests from the httpd to one of a set of application server nodes. So the question comes Why mod_cluster ? To answer this question we will let you know few advantages of mod_cluster over mod_jk and other httpd-based load balancers.
These are my links for 16 gen 2013 through 17 gen 2013:
Graylog2 – Free open source self-hosted log management and exception tracking – Simple log management Graylog2 enables you to unleash the power that lays inside your logs. Use it to run analytics, alerting, monitoring and powerful searches over your whole log base. Need to debug a failing request? Just run a quick filter search to find it and see what errors it produced. Want to see all messages a certain API consumer is consuming in real time? Create streams for every consumer and have them always only one click away.
Free and open source Graylog2 is free and open source. It is licensed under the GNU General Public License v3 (GPLv3) and all source code can be browsed on GitHub. The web interface is using Ruby On Rails, the server is written in Java.
Used by professionals The first version of Graylog2 was released in July 2010. Since then there has been rapid and continuous development and a number of major releases.
Centralizzare i log mediante Elasticsearch, Logstash e Kibana – Mia mamma usa Linux! – Uno dei principali problemi che si rilevano in fase di debug delle anomalie relative ad applicazioni è la frammentazione delle informazioni. Tanti log, buona parte dei quali inutili, sono sparsi ovunque nelle macchine interessate all’erogazione di questo o quel servizio. Tipicamente quando si tratta di servizi ripartiti su più macchine è sempre necessario aprire diverse console all’interno delle quali, per ciascuna macchina, il (o i) file di log vengono aperti, filtrati stampati e via così, sino ad ottenere una situazione degna di Sherlock Holmes, in cui solo consumati ed abili detective riescono a trovare l’indizio che sfugge ai più.
Esiste però una via migliore per gestire enormi quantità di log in una forma centralizzata, facilmente ricercabile e che usi un’interfaccia gradevole. Si tratta della combinazione di tre software: Elasticsearch, Logstash e Kibana.
Viste le numerose richieste ricevute e rispettando sempre la filosofia alla base del progetto miamammausalinux.org, il video del seminario viene proposto integralmente nelle sue parti, insieme alla documentazione fornita ai partecipanti.
Using Transport Rules: Creating Disclaimers in Exchange Server 2007 – The new architecture of Exchange Server 2007 allows administrators to use many features to manage the messages in transit using transport rules. In this article we will discuss a scenario in which we deploy some transport rules to use disclaimers based on a company’s needs.<br /> <br /> The objective of this article is to explain how we achieved a disclaimer solution using Exchange Server 2007 and the transport rule feature.