These are my links for 16 Mar 2016 through 24 Mar 2016:
- “Reverse Engineering for Beginners” free book –
- Resolve Hardware Status Alert SEL_FULLNESS | Brian Ragazzi – […] I noticed an alert on two UCS B250M2 hosts in the vSphere Client. The alert Name was “Status of other host hardware objects”. This isn’t helpful. To get more information, you have to navigate to the Hardware Status tab of the host properties. Here I saw more information about the alert. It’s cryptically named “System Board 0 SEL_FULLNESS”. […]
- Network Stack: Cisco ASA Packet Capture – […] The ASA platform has fantastic built-in packet capture capabilities which can come in very handy for troubleshooting issues. I will be demonstrating some of the capabilities using an ASA 5505 running version 9.0(1).Performing a packet capture is done using the capture command from privileged exec mode. […][ Fantastic… I won’t say that ]
- Multistage environments with Ansible – Ross Tuck – Ansible has excellent documentation but one thing I was confused about was the best way to store the configuration for multistage projects: say, different passwords for dev, staging, production. This isn’t really covered in the ansible-examples repo because it’s specific to your project and while the documentation has recommendations, it doesn’t spell it out completely (which I need since I’m an idiot).
These are my links for 30 Dic 2015 through 17 Feb 2016:
- Robtex – We aim to make the fastest and most comprehensive free DNS lookup tool on the Internet
- Try Perl: learn the basics of the Perl language in your browser – Welcome to Try Perl ! The window on your right is an interactive Perl interpreter. You can type Perl statements and watch it run. [ via MD http://braindead.tumblr.com/post/136604576916 ]
- Syncthing – Syncthing replaces proprietary sync and cloud services with something open, trustworthy and decentralized. Your data is your data alone and you deserve to choose where it is stored, if it is shared with some third party and how it's transmitted over the Internet.
- AlessandroZ/LaZagne · GitHub – The LaZagne project is an open source application used to retrieve lots of passwords stored on a local computer. Each software stores its passwords using different techniques (plaintext, APIs, custom algorithms, databases, etc.). This tool has been developed for the purpose of finding these passwords for the most commonly-used software. At this moment, it supports 22 Programs on Microsoft Windows and 12 on a Linux/Unix-Like OS.
These are my links for 14 feb 2013 through 19 feb 2013:
- How-To: Bash Parameter Expansion and String Manipulation | Debuntu – There is many ways to do string manipulation with bash, like finding a filename extension using expr, separating the directory part from a filename using dirname and basename…. or even more sophisticated ones based on regex, sed…. Why using a sledgehammer to crack a nut when you could use bash builtin functionalities! Bash built-ins expansion can be used to: Get substrings Substitute part of a string Case modification Removing prefix and suffix of a string
- Vagrant – Create and configure lightweight, reproducible, and portable development environments. Vagrant is a tool for building complete development environments. With an easy-to-use workflow and focus on automation, Vagrant lowers development environment setup time, increases development/production parity, and makes the "works on my machine" excuse a relic of the past.
- » Linuxaria – Everything about GNU/Linux and Open source How to log the correct Ip having Varnish and Nginx – When you run a webserver behind a reverse proxy or HTTP accelerator such as Varnish, the webserver access logs will display the IP of the proxy (generally 127.0.0.1) instead of the end user’s IP. This is a problem when you have a software like webalizer, awstats or similar log file analysis program, because you lose one of the most important information: “Who is the requestor of a page ?”, also having all the access coming from the same IP (127.0.0.1) you lose information such as “what’s the browsing pattern of visitors ?” “Is someone trying to do something Nasty ?”
These are my links for 3 set 2012 through 5 set 2012:
- OneLook Reverse Dictionary – How do I use OneLook's reverse dictionary feature?
OneLook's reverse dictionary lets you describe a concept and get back a list of words and phrases related to that concept. Your description can be a few words, a sentence, a question, or even just a single word. Just type it into the box above and hit the "Find words" button. Keep it short to get the best results. In most cases you'll get back a list of related terms with the best matches shown first.
[ via http://blog.terminologiaetc.it/2012/09/04/onelook-reverse-dictionary/ ]
- missing disks, dump devices, mirroring, etc. – Waldemar Mark Duszyk – Since, we are pretty much always learning …. Some of us on a more elementary, intermediate, or advanced level but regardless of the level we all always learn or re-learn (because what we have mastered we had an ample time to forget – not doing it for a while), here it is a reminder of how to deal with a volume group (in this case it is rootvg which for some reasons lost one of it disks. The loss could be a function of SAN, VIO or other event. It could be a permanent loss – a disk is dead, broken, no longer functioning or the loss was/is temporary in nature; AIX kernel detected a timeout (without any disk errors associated with device failure) long enough for the kernel to mark the disks missing.
- Authenticating RedHat with ActiveDirectory and Kerberos – Waldemar Mark Duszyk – One of my previous posts deals with authentication of RedHat LINUX using Tivoli Directory Server (TDS LDAP). As I was working on this project, my colleague Igor was busy configuring RedHat authentication with Active Directory and Kerberos (already configured on AD).