How to create an RPM package – FedoraProject – This page describes in detail how to create an RPM package, and in particular, how to create a SPEC file. Unlike other RPM guides, this page explains the specifics for Fedora with links to Fedora-specific guidelines. Since it is maintained through the Fedora Wiki, it is likely to be more up-to-date than other guides. Despite the focus on Fedora, most of this document does apply to other RPM-based distributions.
How To Install Elasticsearch, Logstash, and Kibana 4 on CentOS 7 | DigitalOcean – In this tutorial, we will go over the installation of the Elasticsearch ELK Stack on CentOS 7—that is, Elasticsearch 1.4.4, Logstash 1.5.0, and Kibana 4. We will also show you how to configure it to gather and visualize the syslogs of your systems in a centralized location. Logstash is an open source tool for collecting, parsing, and storing logs for future use. Kibana 4 is a web interface that can be used to search and view the logs that Logstash has indexed. Both of these tools are based on Elasticsearch.
These are my links for 30 mar 2015 through 31 mar 2015:
5 easy tips to accelerate SSL – Unhandled expression – SSL is slow. These cryptographic algorithms eat the CPU, there is too much traffic, it is too hard to deploy correctly. SSL is slow. Isn’t it? HELL NO! SSL looks slow, because you did not even try to optimize it! For that matter, I could say that HTTP is too verbose, XML web services are verbose too, and all this traffic makes the website slow. But, SSL can be optimized, as well as everything!
Cybrary – Free Online IT and Cyber Security Training, Forever! – Cybrary is a free and open source, online information technology (IT) and cyber security training environment for the world. We are dedicated to keeping the world’s IT professionals prepared for this ever changing industry and its technologies. You can learn almost anything IT and security related for free, and you can help others to do the same. Take a look at what you can learn: Systems Administration Network Administration Cyber Security Our free IT training classes include everything from industry certifications such as Certified Ethical Hacker, CISSP and CCNA to advanced niche skill sets like advanced penetration testing and cloud administration. Our training includes instructional lectures, interactive lab demonstrations, exam study guides, white papers, case studies and more. [ via https://delicious.com/farmando]
Exploit Exercises – exploit-exercises.com provides a variety of virtual machines, documentation and challenges that can be used to learn about a variety of computer security issues such as privilege escalation, vulnerability analysis, exploit development, debugging, reverse engineering, and general cyber security issues. [ via https://delicious.com/farmando ]
bonasia.info: pdftk – PDFtk è un programma molto utile se dovete manipolare file nel comune formato di Adobe Acrobat.
How To Set Up a Chef 12 Configuration Management System on Ubuntu 14.04 Servers | DigitalOcean – In this guide, we will install the actual software. We will set up a centralized Chef server which will store and serve configuration instructions and node profiling information. We will also set up a workstation where the administrator can work with the code base and alter the characteristics of the infrastructure. We will follow this up by bootstrapping a new node to bring it under the management of the Chef ecosystem.
These are my links for 11 mar 2015 through 12 mar 2015:
GoAccess – Visual Web Log Analyzer – GoAccess is an open source real-time web log analyzer and interactive viewer that runs in a terminal in *nix systems. It provides fast and valuable HTTP statistics for system administrators that require a visual server report on the fly.
FastVPSEestiOu/fastnetmon – FastNetMon – high performance DoS/DDoS and netflowk load analyzer builded on top of multiple packet capture engines (netmap, PF_RING, sFLOW, Netflow, PCAP). What we do? We can detect hosts in our own network with big amount of packets per second/bytes per second or flow per second incoming or outgoing from certain host. And we can call external script which can send notify, switch off server or blackhole this client. [ via https://delicious.com/farmando ]