Bookmarks for 7 ago 2014 from 09:19 to 13:34

These are my links for 7 ago 2014 from 09:19 to 13:34:

  • Orabig/Sbire – Sbire is a set of scripts whose aim is to help deploy, modify and maintain remote NRPE scripts.
  • raspbian – How do I reset a USB device using a script? – Raspberry Pi Stack Exchange – I have a USB GSM modem that does not alwasys work property (Huawei E367u-2) Sometimes it gets reset (USB device disconnect/reconnect in logs) and when it comes back up, it's has different ttyUSB numbers. Sometimes on boot, usb_modswitch seems to just not get fired. The computer is a Raspberry Pi running Raspbian. I have a simple solution to this, every minute CRON runs the following script
  • redirect_blame/ at gh-pages · will/redirect_blame – Zero-downtime deploys are hard. Why bother when you can trick your users into thinking their internet is a little flaky? They'll keep refreshing until your deploy is over. Set this as your error page, and your users will see an error page that looks like their browser is having some trouble.

Bookmarks for 15 mag 2014 through 2 giu 2014

These are my links for 15 mag 2014 through 2 giu 2014:

  • Babun | A windows shell you will love! – Would you like to use a linux-like console on a Windows host without a lot of fuzz? Try out babun!
  • OpenSSH – Wikibooks, open books for an open world – The OpenSSH suite provides secure remote access and file transfer. Since its initial release, it has grown to become the most widely used implementation of the SSH protocol. During the first ten years of its existence, ssh has largely replaced older corresponding unencrypted tools and protocols. The OpenSSH client is included by default in most operating system distributions, including OS X, Linux, BSD and Solaris. Any day you use the Internet, you are using and relying on dozens if not hundreds of machines operated and maintained using OpenSSH. A survey in 2008 showed that of the SSH servers found running, just over 80% were OpenSSH. [1] OpenSSH was first released towards the end of 1999. It is the latest step in a very long and useful history of networked computing, remote access and telecommuting. This book is for fellow users of OpenSSH to help them save effort and time through using OpenSSH, and especially SFTP, where it makes sense to use it.
  • ssl-cert-check » Linux Shtuff – [...] Digital certificates have become an essential part of Internet commerce, and are widely used to verify the identity of clients and servers. All digital certificates contain an expiration date which most client and server applications will check before using the certificates contents. If a client or server application detects that a certificate has expired, one or more implementation specific actions (e.g., abort connection, check or update a revocation list, alert user, etc.) are typically performed.[...]

Bookmarks for 28 mar 2014 through 29 mar 2014

These are my links for 28 mar 2014 through 29 mar 2014:

  • LDAP org chart | – For centralised authentication and authorisation, LDAP is the de-facto standard. Whether in its pure form on Unix or in Active Directory guise on Windows, everyone uses it. What many people don't realise is that you can store all sorts of useful (and not so useful) information in LDAP. One field which can be useful is the "manager" attribute. One of our customers use that and so we've written a small script to graph it using the excellent Graphviz tool. It will probably need customising for specific cases, however we hope that people find it useful nonetheless. If you want to alter the output, do have a look at the record format documentation.
  • Puppet errors explained | – Puppet is a wonderful system automation tool, however the learning curve can be a little steep. We've collected some of the errors messages and "strange" behaviour you may come across together with explanations to help overcome these hurdles and boost adoption of this fabulous tool. If you have any useful errors and explanations, please do send them in and we'll update this article.
  • SCAP: Guide To The Secure Configuration of Red Hat Enterprise Linux 5 – This guide has been created to assist IT professionals, in effectively securing systems with Red Hat Enterprise Linux 5.
  • DNS Load Balancing and Using Multiple Load Balancers in the Cloud – [...] Load balancing in general is a complicated process, but there's some secret sauce in managing DNS along with multiple load balancers in the cloud. It requires that you draw from a few different sets of networking and “cloudy” concepts. In this second article in my best practices series (my first post covered how to use credentials within RightScale for storing sensitive or frequently used values), I'll explain how to set up load balancers to build a fault-tolerant, highly available web application in the cloud. Here's what you’ll need: Multiple A records for a host name in the DNS service of your choice Multiple load balancers to protect against failure [...]
  • gdnsd – gdnsd is an Authoritative-only DNS server which does geographic (or other sorts of) balancing, redirection, weighting, and service-state-conscious failover at the DNS layer. gdnsd is written in C using libev and pthreads with a focus on high performance, low latency service. It does not offer any form of caching or recursive service, and notably does not support DNSSEC. There's a strong focus on making the code efficient, lean, and resilient. The code has a decent regression testsuite with full branch coverage on the core packet parsing and generation code, and some scripted QA tools for e.g. valgrind validation, clang-analyzer, etc. The geographically-aware features also support the emerging EDNS Client Subnet draft for receiving more-precise network location information from intermediate shared caches.

Bookmarks for 8 ago 2013 through 12 ago 2013

These are my links for 8 ago 2013 through 12 ago 2013:

  • Shuttle | A simple SSH shortcut menu for OS X – A simple SSH shortcut menu for OS X
  • Unix FAQ/shell Index
  • Portable Shell – Autoconf – When writing your own checks, there are some shell-script programming techniques you should avoid in order to make your code portable. The Bourne shell and upward-compatible shells like the Korn shell and Bash have evolved over the years, and many features added to the original System7 shell are now supported on all interesting porting targets.