Jan 202013
 

alias.shIf you are a Linux system administrator or you just wish to save a copy of your alias on the net, this is the service for you !
alias.sh is a new project that offer a simple service: allows you to manage all of your aliases online and browse the list of cool aliases submitted by others. From the term of your desktop, or server, you can run a single command to copy all your aliases on your system, or back into your profile should you require them.

You’ll have public alias, that everyone can use and that you can share with friends and followers and private alias, for your use only.

Continue reading »

Flattr this!

Jan 192013
 

When something goes wrong on your Linux server or desktop, is important to understand which process is taking all the resources, in the past I’ve published some information about top and htop, two great tools to have a general overview of your system with just a glance, but sometimes you need to gather more information of a particular process and for this task the command pidstat is perfect.

Pidstat is a statistics report tool for Linux which is part of the sysstat utilities. The pidstat command is used for monitoring individual tasks currently being managed by the Linux kernel. It writes to standard output activities for every task selected with option -p or for every task managed by the Linux kernel if option -p ALL has been used. Not selecting any tasks is equivalent to specifying -p ALL but only active tasks (tasks with non-zero statistics values) will appear in the report.
You can use PID’s and even regular expressions on the process names to filter them out.
Continue reading »

Flattr this!

Jan 192013
 

This is a new and interesting project that could be really useful both for companies that for private users, Guacamole is an HTML5 remote desktop gateway that provides access to desktop environments using remote desktop protocols like VNC and RDP. A centralized server acts as a tunnel and proxy, allowing access to multiple desktops through a web browser.

Be aware that Guacamole is only a remote desktop gateway, and cannot access your desktop’s display without a remote desktop server of some kind to connect to. Guacamole does not contain its own VNC or RDP server, it’s a java based program so it’s distributed as a .war package.

The client requires nothing more than a web browser supporting HTML5 and AJAX.
Continue reading »

Flattr this!

Jan 162013
 

Linux has had a relatively difficult time in making its impact on market shares for gamers. Dominated by Microsoft and Mac, the gaming network appears to be fairly full. In 2013, though, that could all change. Linux-powered game consoles are on their way and this could greatly impact the way in which games are played and the publishers of these sources of entertainment.

Not sure what to expect in this new year? The following explains more about these Linux-powered offerings and what they could do to the market. Specifically, focus in this article is not the systems themselves, rather, but the relationship and impact their anticipation is already having on the overall nature and scene of the gaming world.

Continue reading »

Flattr this!

Jan 132013
 

Today I present a really interesting article by   first published on Infosecinstitute.com.

With the significant prevalence of Linux web servers globally, security is often touted as a strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable to compromise. While specific configurations vary wildly due to environments or specific use, there are various general steps that can be taken to insure basic security considerations are in place.

Many risks are possible from a compromise including using the web server into a source of malware, creating a spam-sending relay, a web or TCP proxy, or other malicious activity. The operating system and packages can be fully patched with security updates and the server can still be compromised based purely on a poor security configuration. Security of web applications first begins with configuring the server itself with strict security in mind.

Continue reading »

Flattr this!