Unhide is a little handy forensic tool to find hidden processes and TCP/UDP ports by rootkits / LKMs or by another hidden technique. This tools works under both Linux / Unix, and MS-Windows operating systems. From the man page:
It detects hidden processes using three techniques:
- The proc technique consists of comparing /proc with the output of /bin/ps.
- The sys technique consists of comparing information gathered from /bin/ps with information gathered from system calls.
- The brute technique consists of bruteforcing the all process IDs. This technique is only available on Linux 2.6 kernels.
Unix time (POSIX time) is a system for describing points in time, defined as the number of seconds elapsed since midnight Coordinated Universal Time (UTC) of January 1, 1970, not counting leap seconds.
Find out – if there any limit to the number of characters in a hostname under Linux?
Last time I wrote about how-to set or retrieve the CPU affinity of a running process given its PID or to launch a new COMMAND with a given CPU affinity.
If you try to mount an ext3 Linux filesystem on a SAN from multiple nodes at the same time you will be in serious deep trouble.
SAN based storage allows multiple nodes to connect to same devices at the same time. Ext3/2 are not cluster aware file system. They can lead to a disaster such as kernel panic, server hang, corruption etc.
You need to use something which supports:
- Useful in clusters for moderate scale out and shared SAN volumes
- Symmetrical Parallel Cluster File System, Journaled
- POSIX access controls
Both GFS (RedHat Global File System) and Lustre (a scalable, secure, robust, highly available cluster file system) can be used with SAN based storage allows multiple nodes to connect to same devices at the same time.
Many newbie get confused as Linux offers a number of file systems. This paper (Linux File System Primer) discusses these file systems, why there are so many, and which ones are the best to use for which workloads and data.