These are my links for 25 ago 2014 from 15:03 to 17:25:
- Passwordless – A node.js/express module for token-based logins – Token-based authentication middleware for Express & Node.js […] Passwords are broken. Inspired by Justin Balthrop's article Passwords are Obsolete token-based one-time password (OTPW) authentication is faster to deploy, better for your users, and more secure. […]
- Mounty for NTFS – A tiny tool to re-mount write-protected NTFS volumes under Mac OS X Mavericks in read-write mode.
- tinc wiki – tinc is a Virtual Private Network (VPN) daemon that uses tunnelling and encryption to create a secure private network between hosts on the Internet. tinc is Free Software and licensed under the GNU General Public License version 2 or later. Because the VPN appears to the IP level network code as a normal network device, there is no need to adapt any existing software. This allows VPN sites to share information with each other over the Internet without exposing any information to others.
- AIXchange: More Resources for AIX Newbies – As I've noted previously, there are more newcomers to the AIX platform than you might imagine. A company may acquire an AIX system through a merger or replace an old Solaris or HP-UX box with a current IBM Power Systems model. As a result, one of their IT pros suddenly becomes the AIX guy. So, now what? How does an AIX newbie get up to speed with virtualization and AIX?
These are my links for 18 apr 2014 through 30 apr 2014:
- JoshData/mailinabox · GitHub – Mail-in-a-Box helps individuals take back control of their email by defining a one-click, easy-to-deploy SMTP+everything else server: a mail server in a box.
- SSH Multi-hop Connections With Netcat Mode Proxy | Click & Find Answer ! – Since OpenSSH 5.4 there is a new feature called natcat mode, which allows you to bind STDIN and STDOUT of local SSH client to a TCP port accessible through the remote SSH server. This mode is enabled by simply calling ssh -W [HOST]:[PORT] Theoretically this should be ideal for use in the ProxyCommand setting in per-host SSH configurations, which was previously often used with the nc (netcat) command. ProxyCommand allows you to configure a machine as proxy between you local machine and the target SSH server, for example if the target SSH server is hidden behind a firewall. The problem now is, that instead of working, it throws a cryptic error message in my face: Bad packet length 1397966893.Disconnecting: Packet corrupt
- Tyblog | SSH Kung Fu – OpenSSH is an incredible tool. Though primarily relied upon as a secure alternative to plaintext remote tools like telnet or rsh, OpenSSH (hereafter referred to as plain old ssh) has become a swiss army knife of functionality for far more than just remote logins. I rely on ssh every day for multiple purposes and feel the need to share the love for this excellent tool. What follows is a list for some of my use cases that leverage the power of ssh.
- Baseimage-docker: A minimal Ubuntu base image modified for Docker-friendliness – YOUR DOCKER IMAGE MIGHT BE BROKEN without you knowing it Learn the right way to build your Dockerfile.
- NetApp – Index – The following documentation is a guide on using and configuring the NetApp servers, there is also a commandline cheat sheet. I have tried to make this section as brief as possible but still cover a broad range of information regarding the NetApp product but I point you to the Official NetApp web site which contains all the documentation you will ever need.
These are my links for 13 mar 2014 through 18 mar 2014:
- Observium – Observium is an autodiscovering SNMP based network monitoring platform written in PHP which includes support for a wide range of network hardware and operating systems including Cisco, Windows, Linux, HP, Dell, FreeBSD, Juniper, Brocade, Netscaler, NetApp and many more. Observium has grown out of a lack of network monitoring platforms which are both simple to manage and pleasant to use. It is intended to provide a navigable interface to the health and performance of your network. Its design goals include collecting as much historical data about devices as possible, using as much auto-discovery as possible with little or no manual intervention, and having a very intuitive interface. Observium is not intended to replace an up/down alerting system like Icinga or Nagios, but rather to complement it with an easy to manage, intuitive representation of historical and current performance statistics, configuration visualisation and syslog capture.
- nikratio / S3QL — Bitbucket – S3QL is a file system that stores all its data online using storage services like Google Storage, Amazon S3, or OpenStack. S3QL effectively provides a hard disk of dynamic, infinite capacity that can be accessed from any computer with internet access running Linux, FreeBSD or OS-X. S3QL is a standard conforming, full featured UNIX file system that is conceptually indistinguishable from any local file system. Furthermore, S3QL has additional features like compression, encryption, data de-duplication, immutable trees and snapshotting which make it especially suitable for online backup and archival. S3QL is designed to favor simplicity and elegance over performance and feature-creep. Care has been taken to make the source code as readable and serviceable as possible. Solid error detection and error handling have been included from the very first line, and S3QL comes with extensive automated test cases for all its components.
- Secure encrypted backup using duplicity for Linux and Mac – I have been looking for a replacement alternative to Dropbox which I use on my Mac mainly for backups (I rarely use the sharing). The requirements were secure encrypted backup (where I control the keys) and “intelligence” so incremental backups could be performed i.e. not copying everything every time[…]
- Duplicati – Duplicati is a free backup client that securely stores encrypted, incremental, compressed backups on cloud storage services and remote file servers. It works with Amazon S3, Windows Live SkyDrive, Google Drive (Google Docs), Rackspace Cloud Files or WebDAV, SSH, FTP (and many more). Duplicati has built-in AES-256 encryption and backups can be signed using GNU Privacy Guard. A built-in scheduler makes sure that backups are always up-to-date. Last but not least, Duplicati provides various options and tweaks like filters, deletion rules, transfer and bandwidth options to run backups for specific purposes. Duplicati is licensed under LGPL and available for Windows and Linux (.NET 2.0+ or Mono required). The Duplicati project was inspired by duplicity. Duplicati and duplicity are similar but not compatible. Duplicati is available in English, Spanish, French, German, Danish, Portugese, Italian, and Chinese.
- MindTerm SSH Client 3.1.2 Signed Java Applet – Java SSH Client MindTerm SSH is a fully functional SSH client written in Java. This page presents Mindterm in the form of an applet. Please wait for the applet to load, it will load automatically once the archive is downloaded, be patient.
These are my links for 24 lug 2012 from 12:40 to 14:51:
- Centrale di Mobilità – Muoviti responsabilmente senza pesare sull'ambiente
- www.vanheusden.com – AIX tips & tricks – AIX tips & tricks
(like: "Finding physical location of a disk" or why "AIX NFS server refuses client to mount share" and many other)
- Account Administration – disciplinux – Change AIX password non-interactively
Use the chpasswd utility to change the password.
- Tightening Default AIX Sendmail – disciplinux – I started looking at the default AIX configuration of sendmail for the SMTP Open Relay issues. Previously I had sent a configuration change to
allow only specific relay-domains. However, it appears that the default sendmail configuration sets "PROMISCUOUS_RELAY" which overrides the
- Configure sendmail to start logging Subject in maillog | www.linux4beginners.info – In this article we will learn how to configure sendmail so that you can log "Subject" in /var/log/maillog as by default sendmail does not log Subject to maillog file.
This is really interesting. Business people many times are interested in getting mail log files analyzed. To analyse mail logs they need various field to appera in mail logs. e.g. "From", "To", "Subject" etc from the sent email. By default sendmail logs From and To fields but it does not log Subject field. In this article you will learn how to enable sendmail to log "Subject".