These are my links for 3 nov 2014 through 5 nov 2014:
- Policy Daemon – Policyd is an anti-spam plugin for Postfix (written in C) that does Greylisting, Sender-(envelope, SASL or host / ip)-based throttling (on messages and/or volume per defined time unit), Recipient rate limiting, Spamtrap monitoring / blacklisting, HELO auto blacklisting and HELO randomization preventation.
- DevStack – an OpenStack Community Production — documentation – A documented shell script to build complete OpenStack development environments. An OpenStack program maintained by the developer community. Setup a fresh supported Linux installation. Clone devstack from git.openstack.org. git clone https://git.openstack.org/openstack-dev/devstack Deploy your OpenStack Cloud cd devstack && ./stack.sh
- vim modeline – Tips and Tricks – ph3nix.Net – Generally you either love or hate Vim. It boils down to a matter of personal preference. However love or hate you have to admit it is extremely powerful for a command line, text only file editor. For those who love it – or just have to make use of it on a regular basis, the Vim modeline feature is a very useful and powerful way of customizing the visual and editing preferences as well as several other options on a file by file basis.
- Development Foo – using vim and sshfs to propel development | New Goliath –
- Front-end engineering and so on: OpenSSL: Convert private key to PEM format for AWS ELB – You might get message "Error: Invalid Private Key" while configuring SSL on Elastic Load Balancer on Amazon Web Services (AWS). It means your private key isn't in PEM format. No worries, it easy to fix.
These are my links for 9 set 2014 through 11 set 2014:
- Hughes Systique Corp. > Research & Innovation > Newsletter > Issue 2 > mySQL – A typical MySQL cluster requires at least 4 nodes for deploying a High Available MySQL database cluster. The typical configuration of any enterprise application is a 2 Node solution (Active-Standby mode or Active-Active Mode). This is where the real challenge lies: in fitting the MySQL Cluster Nodes in the 2 Nodes offering the application services and then making it work in the configuration without a single point of failure.
- Corosync / Pacemaker – Execute script on failover – Raymii.org – With Corosync/Pacemaker there is no easy way to simply run a script on failover. There are good reasons for this, but sometimes you want to do something simple. This tutorial describes how to change the Dummy OCF resource to execute a script on failover. In this example it is a script which triggers a few SNMP traps, sends an alert to Nagios and sends some data to Graphite. SNMP alone could be done with the ocf:heartbeat:ClusterMon resource, but the other stuff not.
- Home – A Banana Pi powered website
- UrBackup – Client/Server Open Source Network Backup for Windows and Linux – UrBackup is an easy to setup open source client/server backup system, that through a combination of image and file backups accomplishes both data safety and a fast restoration time. File and image backups are made while the system is running without interrupting current processes. UrBackup also continuously watches folders you want backed up in order to quickly find differences to previous backups. Because of that incremental file backups are really fast. Your files can be restored through the web interface or the Windows Explorer while the backups of drive volumes can be restored with a bootable CD or USB-Stick (bare metal restore). A web interface makes setting up your own backup server really easy.
These are my links for 7 ago 2014 from 09:19 to 13:34:
- Orabig/Sbire – Sbire is a set of scripts whose aim is to help deploy, modify and maintain remote NRPE scripts.
- raspbian – How do I reset a USB device using a script? – Raspberry Pi Stack Exchange – I have a USB GSM modem that does not alwasys work property (Huawei E367u-2) Sometimes it gets reset (USB device disconnect/reconnect in logs) and when it comes back up, it's has different ttyUSB numbers. Sometimes on boot, usb_modswitch seems to just not get fired. The computer is a Raspberry Pi running Raspbian. I have a simple solution to this, every minute CRON runs the following script
- redirect_blame/Readme.md at gh-pages · will/redirect_blame – Zero-downtime deploys are hard. Why bother when you can trick your users into thinking their internet is a little flaky? They'll keep refreshing until your deploy is over. Set this as your error page, and your users will see an error page that looks like their browser is having some trouble.
These are my links for 15 mag 2014 through 2 giu 2014:
- Babun | A windows shell you will love! – Would you like to use a linux-like console on a Windows host without a lot of fuzz? Try out babun!
- OpenSSH – Wikibooks, open books for an open world – The OpenSSH suite provides secure remote access and file transfer. Since its initial release, it has grown to become the most widely used implementation of the SSH protocol. During the first ten years of its existence, ssh has largely replaced older corresponding unencrypted tools and protocols. The OpenSSH client is included by default in most operating system distributions, including OS X, Linux, BSD and Solaris. Any day you use the Internet, you are using and relying on dozens if not hundreds of machines operated and maintained using OpenSSH. A survey in 2008 showed that of the SSH servers found running, just over 80% were OpenSSH.  OpenSSH was first released towards the end of 1999. It is the latest step in a very long and useful history of networked computing, remote access and telecommuting. This book is for fellow users of OpenSSH to help them save effort and time through using OpenSSH, and especially SFTP, where it makes sense to use it.
- ssl-cert-check » Linux Shtuff – […] Digital certificates have become an essential part of Internet commerce, and are widely used to verify the identity of clients and servers. All digital certificates contain an expiration date which most client and server applications will check before using the certificates contents. If a client or server application detects that a certificate has expired, one or more implementation specific actions (e.g., abort connection, check or update a revocation list, alert user, etc.) are typically performed.[…]