Archivio tag: scripting

Bookmarks for 26 ago 2014 through 27 ago 2014

These are my links for 26 ago 2014 through 27 ago 2014:

  • Regular Expressions – Regular expressions ("regexes") are supercharged Find/Replace string operations. Regular expressions are used when editing text in a text editor, to: check whether the text contains a certain pattern find those pattern matches, if there are any pull information (i.e. substrings) out of the text make modifications to the text. As well as text editors, almost every high-level programming language includes support for regular expressions. In this context "the text" is just a string variable, but the operations available are the same. Some programming languages (Perl, JavaScript) even provide dedicated syntax for regular expression operations.
  • MySQL active-passive cluster | Your IT goes Linux – We will use the iSCSI Lun defined in our iSCSI cluster as a shared storage and we will run MySQL in active-passive (fail-over) mode using Pacemaker and Corosync cluster engine. The cluster will have to connect to the iSCSI target, mount the iSCSI partition on one node and start a MySQL service which has all its data on this partition.
  • Perl – [...] Perl has horrors, but it also has some great redeeming features. In this respect it is like every other programming language ever created. This document is intended to be informative, not evangelical. It is aimed at people who, like me: dislike the official Perl documentation at http://perl.org/ for being intensely technical and giving far too much space to very unusual edge cases learn new programming languages most quickly by "axiom and example" wish Larry Wall would get to the point already know how to program in general terms don't care about Perl beyond what's necessary to get the job done. This document is intended to be as short as possible, but no shorter[...]
  • Linux Performance – This page links to various Linux performance material I've created, including the tools maps on the right, which show: Linux observability tools, Linux benchmarking tools, Linux tuning tools, and Linux observability sar. For more diagrams, see my slide decks below.
  • AIXchange: Useful Storage Links – Here's an assortment of really good storage-related articles — the majority of which are found on IBM developerWorks — that are worth your time. While some of them are a few years old, they still provide relevant information.

Bookmarks for 10 gen 2014 through 15 gen 2014

These are my links for 10 gen 2014 through 15 gen 2014:

  • CodeCombat – Learn programming with a multiplayer live coding strategy game. You're a wizard, and your spells are JavaScript. Free, open source HTML5 game! [ via http://hackingitalia.com/ ]
  • » Linuxaria – Everything about GNU/Linux and Open source SSH in 2 steps on Linux with Google Authenticator – Many security policies require you to change the port number of the SSH service to ensure greater security in a Linux system. Situation now used throughout the IT world and used mostly by users who have their own private server. Today I want to show you how to add another security layer without having to change the SSH port. To do this we’ll incorporate the famous Google Authenticator to our ssh service, in this way we’ll have a safe, two steps security, by entering our password and the combination given from the GA application. Let’s see how to do this…
  • SoftEther VPN Project – SoftEther VPN Project – SoftEther VPN is one of the most powerful and easiest VPN software in the world. It is freeware, developed as an academic research project in University of Tsukuba, Japan. Download SoftEther VPN and enjoy it today. It is open source. Features * Easy to establish both remote-access and site-to-site VPN. * SSL-VPN Tunneling on HTTPS to pass through NATs and firewalls. * Revolutionary VPN over ICMP and VPN over DNS features. * Ethernet-bridging (L2) and IP-routing (L3) over VPN. * Embedded dynamic-DNS and NAT-traversal so that no static nor fixed IP address is required. * AES 256-bit and RSA 4096-bit encryptions. * 1Gbps-class high-speed throughput performance with low memory and CPU usage. * Windows, Linux, Mac, Android, iPhone, iPad and Windows Phone are supported. * SSL-VPN (HTTPS) and 6 major VPN protocols (OpenVPN, IPsec, L2TP, MS-SSTP, L2TPv3 and EtherIP) [ via http://www.net-security.org/secworld.php?id=16171 ]

Bookmarks for 29 nov 2012 from 15:24 to 16:55

These are my links for 29 nov 2012 from 15:24 to 16:55:

  • PowerShell Commands (CMDLETs) for Active Directory by Quest – The ActiveRoles Management Shell for Active Directory is a set of free, predefined commands for Windows PowerShell, the powerful command line and scripting language developed by Microsoft. These commands are designed to help administrators automate common, repetitive and bulk management tasks for Active Directory, such as creating, removing or updating objects in AD.
  • PowerGUI.org – Free Windows Powershell Community – Welcome to PowerGUI.org – a free community for PowerGUI, a graphical user interface and script editor for Microsoft Windows PowerShell!
  • ksh_timer – An interface to evaluate function execution time in shell script in each function or in user-defined sections

    Summary:  ksh_timer helps ksh script developers or administrators to find out quickly and with minimal change in their script, what functions or user-defined sections are time consuming. By default, ksh_timer will time the overall script and each function defined and used in the script. Users can define additional sections of the scripts they need to be timed.