This might breathe new life into the systemd vs. system v war. Meh.
*nix network administration
Sunday, October 02, 2016
Tuesday, September 20, 2016
Linux Systems Lead Blade Server Market from Akeene
Thursday, September 25, 2014
Serious BASH vulnerability. Update, update update.
Read Red Hat's Security blog, Ubuntu's advisory, and US-Cert's advisory.
Tuesday, August 05, 2014
CentOS 7 systemd
So, I am taking CentOS 7 for a spin and the first thing I noticed was how much faster it boots. Low and behold, SysV has been replaced by systemd. There is a simplistic explanation of the differences in "Here We Go Again, Another Linux Init: Intro to systemd." In a nutshell, systemd uses sockets for checking of dependencies thus allowing multiple services to start simultaneously. With SysV, services where loaded one at a time based on a defined order like requiring networking to have started prior to starting SSHd.
Once you wrap your head around this, the second article, "Managing Services on Linux with systemd," describes basic usage. I found "An introduction to systemd for CentOS 7" and "Systemd" to be very helpful. The latter being the most technical and most important to administrators.
Wednesday, July 09, 2014
Friday, June 13, 2014
Tuesday, April 08, 2014
(OpenSSL) Patch Tuesday - Not just for M$ anymore.
A pretty serious flaw exposes TLS dependent services in OpenSSL, dubbed "HeartBleed." Patch now!
CERT: http://www.kb.cert.org/vuls/id/720951
FAQ: http://heartbleed.com/
Thursday, March 06, 2014
Friday, October 26, 2012
SSH Key Authentication References
SSH Key based authenticationA simple explanation and guide to the basics of key authentication. If you hit enter without using a passphrase, then you are strictly using key authentication as the only authentication.
SSH Keys (archlinux Wiki)
This one is more intense and has more explanation on how key authentication works. It includes options for added security and strngth. About a 1/3 of the way down, there are a couple of methods, including a "simple" method. I have never tried to use the ssh-copy-id command, but, it looks like it could help simplify things.
11.2.4. Using a Key-Based Authentication
This is Red Hat's official documentation. It is considered "THE" documentation for our class other than the Academy.
SSH Key-Based Authentication on RHEL6
This is specific to SELinux relating to your key authentication setup. I doubt you will have this issue, but, it is good to know.
Friday, October 19, 2012
Tuesday, September 18, 2012
There was recently a request for presentations for developers on a listserv I subscribe to. I thought it would be good to post them here for reference.
6DEPLOY-2 Tutorials (lots of good stuff)
6DEPLOY-2 e-Learning and IPv6 in 5 minutes
Slides and hands-on exercise Jim Leinweber's presentation:
IPv6 Porting Information (Hurricane Electric [HE] has an IPv6 cert too!)
Friday, March 23, 2012
Tuesday, February 14, 2012
So, ifconfig, netstat, route are no longer maintined. Here's info on the newer alternatives:
Doug Vitale Tech Blog: Deprecated Linux networking commands and their replacements
Linux: Where the Jobs (and Bigger Salaries) Are
Saturday, February 11, 2012
Here are three links I used when reviewing for the RHCSA exam:
RHCSA: My study guide
Musings on Information Technology - A view from the trenches
Unofficial RHCE Study Guide
These I used for the RHCE:
RHCE: My study guide
Musings on Information Technology - A view from the trenches
Thursday, August 25, 2011
Saturday, October 23, 2010
Monday, September 20, 2010
SCO puts Unix assets up for sale from Clyde
Friday, September 17, 2010
Saturday, May 29, 2010
Thursday, November 19, 2009
Friday, October 16, 2009
Thursday, September 03, 2009
I am still irritated that the "makers" of Helix are selling free and Open Source software (among other things) for a price in violation of the letter and spirit of the GPL (under which much of the code is published). I am curious to see what the folks at GPL Violations think so I have sent a query to license-violation@gpl-violations.org.
Monday, March 23, 2009
Wednesday, February 18, 2009
Could be good news: Microsoft, Red Hat to interoperate patent-free
Wednesday, February 04, 2009
The PDF Edition of Ubuntu Pocket Guide and Reference is available entirely free of charge.
Wednesday, January 28, 2009
Wednesday, December 24, 2008
Just a question: would anyone be interested in forming an Asterisk (or VoIP) users group in the Tidewater area? Contact joat at 757 dot org.
Monday, September 22, 2008
Wednesday, July 16, 2008
Wednesday, April 09, 2008
Zenoss Core is an open source IT monitoring product that delivers the functionality to effectively manage the configuration, health, performance of networks, servers and applications through a single, integrated software package.