These are my links for 9 mar 2015 from 10:39 to 15:26:
Oliver | An Introduction to Unix – Everybody Knows How to Use a Computer, but Not Everyone Knows How to Use the Command Line. Yet This is the Gateway to Doing Anything and Everything Sophisticated with a Computer and the Most Natural Starting Place to Learn Programming [ via https://delicious.com/bru ]
Security Tips for Apache Web Server – Debian-based Systems – Apache is one of the most widely spread Open Source web server for web hosting in Internet due to its stability, robustness and rich variety of modules and features. Due to its popularity, Apache comes with pre-build binary packages for almost all major Linux distributions and can also be installed on other Operating Systems such as Unix, Windows, Mac OSX, BSD etc. However, a basic installation of Apache on Linux systems, by default, doesn’t offer a full protection against attackers, so a few security measures must be taken in order to protect your machines, web servers and web documents against such types of malicious attacks. This article will provide you a few tips on how you can secure and protect Apache Web Server installed on Debian-based Linux distributions.
These are my links for 26 ago 2014 through 27 ago 2014:
MySQL active-passive cluster | Your IT goes Linux – We will use the iSCSI Lun defined in our iSCSI cluster as a shared storage and we will run MySQL in active-passive (fail-over) mode using Pacemaker and Corosync cluster engine. The cluster will have to connect to the iSCSI target, mount the iSCSI partition on one node and start a MySQL service which has all its data on this partition.
Perl – […] Perl has horrors, but it also has some great redeeming features. In this respect it is like every other programming language ever created. This document is intended to be informative, not evangelical. It is aimed at people who, like me: dislike the official Perl documentation at http://perl.org/ for being intensely technical and giving far too much space to very unusual edge cases learn new programming languages most quickly by "axiom and example" wish Larry Wall would get to the point already know how to program in general terms don't care about Perl beyond what's necessary to get the job done. This document is intended to be as short as possible, but no shorter[…]
Linux Performance – This page links to various Linux performance material I've created, including the tools maps on the right, which show: Linux observability tools, Linux benchmarking tools, Linux tuning tools, and Linux observability sar. For more diagrams, see my slide decks below.
AIXchange: Useful Storage Links – Here's an assortment of really good storage-related articles — the majority of which are found on IBM developerWorks — that are worth your time. While some of them are a few years old, they still provide relevant information.
IT Security and Hacking knowledge base – SecDocs – Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy.
These are my links for 10 gen 2014 through 15 gen 2014:
» Linuxaria – Everything about GNU/Linux and Open source SSH in 2 steps on Linux with Google Authenticator – Many security policies require you to change the port number of the SSH service to ensure greater security in a Linux system. Situation now used throughout the IT world and used mostly by users who have their own private server. Today I want to show you how to add another security layer without having to change the SSH port. To do this we’ll incorporate the famous Google Authenticator to our ssh service, in this way we’ll have a safe, two steps security, by entering our password and the combination given from the GA application. Let’s see how to do this…
SoftEther VPN Project – SoftEther VPN Project – SoftEther VPN is one of the most powerful and easiest VPN software in the world. It is freeware, developed as an academic research project in University of Tsukuba, Japan. Download SoftEther VPN and enjoy it today. It is open source. Features * Easy to establish both remote-access and site-to-site VPN. * SSL-VPN Tunneling on HTTPS to pass through NATs and firewalls. * Revolutionary VPN over ICMP and VPN over DNS features. * Ethernet-bridging (L2) and IP-routing (L3) over VPN. * Embedded dynamic-DNS and NAT-traversal so that no static nor fixed IP address is required. * AES 256-bit and RSA 4096-bit encryptions. * 1Gbps-class high-speed throughput performance with low memory and CPU usage. * Windows, Linux, Mac, Android, iPhone, iPad and Windows Phone are supported. * SSL-VPN (HTTPS) and 6 major VPN protocols (OpenVPN, IPsec, L2TP, MS-SSTP, L2TPv3 and EtherIP) [ via http://www.net-security.org/secworld.php?id=16171 ]