Dec 192014
 

Like every year it’s time once again to read the sysadvent blog, a great source of interesting article.

This one it’s an article of one year ago, but still really useful and interesting

Written by: Michael Stahnke (@stahnma)
Edited by: Adam Compton (@comptona)

Over the years, I have mentored quite a few System Administrators. Levelling up means learning about your tools and what they’re capable of (and not memorizing command line flags). For this year’s article on SysAdvent, I wanted to share a lot about one my favorite tools: yum. When I say yum, I mean a little more than just the yum cli itself, but the ecosystem of tooling around it. I spend a lot of time doing things like package building, package repository management, and all in all hacking around with rpms and yum.

Yum is a tool that you’ve probably used if you been a system administrator for any period of time. It’s also one of those tools that is very easy to use and have it get out of your way. yum does network-based dependency resolution, meaning that if you want to install a package, it will download and install all dependencies of that package as well. These are the basics people often know. Under the hood it uses rpm. In normal operation, you use yum for searching, installation and uninstallation of packages. That’s actually pretty awesome, but mainly the trivial use-case for yum.

Beyond that, however, there is much more to the way yum works and interacts with repository metadata. Sometimes being able to query that data can solve heinous problems easily, rather than coming up with odd workarounds. That information can also help you make good decisions about package management.

Continue reading »

flattr this!

Dec 282013
 

Article by Alessio bash, first published on his blog

Many security policies require you to change the port number of the SSH service to ensure greater security in a Linux system. Situation now used throughout the IT world and used mostly by users who have their own private server. Today I want to show you how to add another security layer without having to change the SSH port. To do this we’ll incorporate the famous Google Authenticator to our ssh service, in this way we’ll have a safe, two steps security, by entering our password and the combination given from the GA application. Let’s see how to do this… Continue reading »

flattr this!

Apr 252013
 

Article by Gary Marten

Linux
GNU/Linux is one of the most rapidly growing open source operating system as it is consistently improving its capabilities to meet the technological requirements. Initially, Linux was not adopted by most of the users because of its command line interface but later developments in Linux provide ease in terms of accessibility and offered Graphical User-Interface (GUI). As it’s an open source OS, it has one of the largest developer community and one of the most prominent contributors in Linux technology is RedHat. Linux was initially designed for Intel x86 personal computers and then later on modified to support different hardware as well.

Continue reading »

flattr this!