These are my links for 8 set 2014 through 9 set 2014:
- How to write udev rules – Since the adoption of Kernel 2.6, Linux has used the udev system to handle devices such as USB connected peripherals. If you want to change the behavior when you plug something into a USB port, this section is for you. As an example, we will use a USB thumb drive but these methods should translate to any device handled by udev. As a goal for this exercise we decided to create a symlink and execute a script when a specific thumb drive was loaded.
- Persistent iSCSI LUN Device Name – jablonskis – […] I spent a bit of time figuring out how to get this achieved, so thought it is worth noting for the future reference. I will try to make this quick assuming you have knowledge about iSCSI software initiators in Linux[…]
- al3x/sovereign – A set of Ansible playbooks to build and maintain your own private cloud: email, calendar, contacts, file sync, IRC bouncer, VPN, and more.
- NSA-proof your e-mail in 2 hours | Sealed Abstract – You may be concerned that the NSA is reading your e-mail. Is there really anything you can do about it though? After all, you don’t really want to move off of GMail / Google Apps. And no place you would host is any better. Except, you know, hosting it yourself. The way that e-mail was originally designed to work. We’ve all just forgotten because, you know, webapps-n-stuff. It’s a lot of work, mkay, and I’m a lazy software developer.
These are my links for 1 set 2014 through 2 set 2014:
- The Twelve-Factor App – In the modern era, software is commonly delivered as a service: called web apps, or software-as-a-service. The twelve-factor app is a methodology for building software-as-a-service apps that: Use declarative formats for setup automation, to minimize time and cost for new developers joining the project; Have a clean contract with the underlying operating system, offering maximum portability between execution environments; Are suitable for deployment on modern cloud platforms, obviating the need for servers and systems administration; Minimize divergence between development and production, enabling continuous deployment for maximum agility; And can scale up without significant changes to tooling, architecture, or development practices. The twelve-factor methodology can be applied to apps written in any programming language, and which use any combination of backing services (database, queue, memory cache, etc).
- British Behaviour, British Etiquette | Debrett’s – Our indispensable Guide to British life and manners. From Countryside Rules, Dress Codes, Kilts, Meeting Royalty and Port Etiquette to Apologising, Introductions, Queuing, Reticence, Small Talk and Understatment. British rituals, social occasions, manners and characteristics decoded.
- A Mailserver on Ubuntu 12.04: Postfix, Dovecot, MySQL – This long post contains a recipe for building a reasonably secure Ubuntu 12.04 mailserver in Amazon Web Services, using Postfix 2.9.1, Dovecot 2.0.19, and MySQL 5.5.22, with anti-spam packages in the form of amavisd-new 2.6.5, Clam AntiVirus 0.97.3, SpamAssassin 3.3.2, and Postgrey 1.3.4. Local users are virtual rather than being system users. Administration of users and domains is achieved through the Postfix Admin 2.3.6 web interface. Webmail is provided by Horde Groupware Webmail Edition 5.04.
These are my links for 1 set 2014 from 11:33 to 16:59:
- home | Policyd – Policyd v2 (codenamed "cluebringer") is a multi-platform policy server for popular MTAs. This policy daemon is designed mostly for large scale mail hosting environments. The main goal is to implement as many spam combating and email compliance features as possible while at the same time maintaining the portability, stability and performance required for mission critical email hosting of today. Most of the ideas and methods implemented in Policyd v2 stem from Policyd v1 as well as the authors' long time involvement in large scale mail hosting industry.
- Using ALIAS-type DNS records for CNAME functionality on naked domains, and an easier alternative – If you've ever wanted to set up domains using cloud hosting services like Heroku or Windows Azure, you've probably come across a limitation with their platforms in regards to using naked domains (the version without the 'www' part, which is also called zone apex or root domain).
- the MUST HAVE – Puoi produrre elettricità, idrogeno per cucinare e l'acqua calda di cui hai bisogno. Raccogli e purifica la pioggia, irriga il tuo orto e molto altro ancora…
These are my links for 28 ago 2014 from 09:32 to 11:55:
- Keepalived for Linux – Keepalived is a routing software written in C. The main goal of this project is to provide simple and robust facilities for loadbalancing and high-availability to Linux system and Linux based infrastructures. Loadbalancing framework relies on well-known and widely used Linux Virtual Server (IPVS) kernel module providing Layer4 loadbalancing. Keepalived implements a set of checkers to dynamically and adaptively maintain and manage loadbalanced server pool according their health. On the other hand high-availability is achieved by VRRP protocol. VRRP is a fundamental brick for router failover. In addition, Keepalived implements a set of hooks to the VRRP finite state machine providing low-level and high-speed protocol interactions. Keepalived frameworks can be used independently or all together to provide resilient infrastructures.
- The BIRD Internet Routing Daemon Project – BIRD is an Internet Routing Daemon designed to avoid all of these shortcomings, to support all the routing technology used in the today's Internet or planned to be used in near future and to have a clean extensible architecture allowing new routing protocols to be incorporated easily. Among other features, BIRD supports: * both IPv4 and IPv6 protocols * multiple routing tables * the Border Gateway Protocol (BGPv4) * the Routing Information Protocol (RIPv2) * the Open Shortest Path First protocol (OSPFv2, OSPFv3) * the Router Advertisements for IPv6 hosts a virtual protocol for exchange of routes between different routing tables on a single host a command-line interface allowing on-line control and inspection of status of the daemon soft reconfiguration[…]
- How to make MaxScale High Available with Corosync/Pacemaker | MariaDB – MaxScale, an open-source database-centric router for MySQL and MariaDB makes High Availability possible by hiding the complexity of backends and masking failures. MaxScale itself however is a single application running in a Linux box between the client application and the databases – so how do we make MaxScale High Available? This blog post shows how to quickly setup a Pacemaker/Corosync environment and configure MaxScale as a managed cluster resource.