The first time I used vi was in a college programming course. It was the default editor on the computer lab's UNIX systems we used to compile our assignments. I remember when our professor first introduced vi and explained that you used the hjkl keys to move your cursor around instead of the arrow keys. more>> […]
One of the most crucial pieces of any UNIX-like operating system is the init dæmon process. In Linux, this process is started by the kernel, and it's the first userspace process to spawn and the last one to die during shutdown. more>>
A new mini-computer is on the way, and it looks like it may be the Raspberry Pi killer we've all been waiting for (sorry Pi). C.H.I.P. is its name, and it looks set to wipe the floor with its established competitor on several counts: 1. It's completely open source. I don't just mean the software, either. more>> […]
With Hiera, you can externalize your systems' configuration data and easily understand how those values are assigned to your servers. With that data separated from your Puppet code, you then can encrypt sensitive values, such as passwords and keys. more>>
DivvyCloud, a fast growing McLean, VA cloud management technology company, has been included in “2015 Cool Vendors” for Cloud Management by Gartner. The report finds “next-generation cloud management architectures are becoming easier to use and implement. more>>
Congratulations! You’ve decided to set up a Web site. The site might be for your personal use, for sharing family pictures, for a blog, for an SaaS application, or any number of other possibilities. In all of those cases, people will access your site using the Hypertext Transfer Protocol (HTTP). more>> […]
Lightweight virtual containers with PID 1. In this article, I demonstrate a method to build one Linux system within another using the latest utilities within the systemd suite of management tools. The guest OS container design focuses upon BusyBox and Dropbear for the userspace system utilities, but I also work through methods for running more general applic […]
Canonical has announced plans to switch all versions of Ubuntu to its new Snappy package manager. The new tool offers the promise of greater stability and security for the system and applications. more>>
How do I use and jump through one server to reach another using ssh on a Linux or Unix-like systems? Is it possible to connect to another host via an intermediary so that the client can act as if the connection were direct using ssh?
I'm using Debian Linux server with Linux Containers (lxc). How do I disconnect and exit from an lxc-console to a shell prompt without closing ssh session? You need to use the to log in to a running Linux container. The syntax is as follows: lxc-console -n container-name lxc-console -n webserver lxc-console -n pgsql To exit […]
A very serious security problem has been found in the virtual floppy drive QEMU's code used by many computer virtualization platforms including Xen, KVM, VirtualBox, and the native QEMU client. It is called VENOM vulnerability. How can I fix VENOM vulnerability and protect my Linux server against the attack? How do I verify that my server has been fixed […]
I want to block Internet Explorer (MS-IE) browser on a squid proxy server running on a Linux or Unix-like systems. How can I block IE on a squid proxy server version 3.x? You need to setup an acl on a squid proxy server to block Microsoft Internet Explorer or any other browser of your choice. […]
I'm using RHEL 7.1-4 container on a RHEL /CentOS Linux 7.x server. However, I'm unable to ping external site/IP address using the ping command. I'm getting the following error on screen:ping: Operation not permitted How do I fix this problem?