The last ten years in the computer and IT security world are crippled with so many vulnerabilities. We saw massive cloud computing adoption and end-users using mobile devices with high speed 4G LTE networks. A threat actor may have exploited such weakness in modern computers and networks. Let us look into top vulnerabilities and the attack surface in this decade (2010-2020) that affected Linux/Unix, macOS, IT, cloud-computing, and computers in general.
Datacenter / NOC
Tutorials and news about data center and associated components, such as telecommunications and storage systems ( rss feed ).
CentOS Linux 8 released on September 24th, 2019. It is a Linux distro derived from Red Hat Enterprise Linux (RHEL) 8. CentOS was created when Red Hat stopped providing RHEL free. These days CentOS mostly used on servers, HPC, and desktop. CentOS is a high-quality Linux distribution. It gives complete control of its open-source software packages and is fully customized for research needs or for running a high-performance website without the need for license fees. Let us see what’s new in CentOS 8 feature wise.
OpenBSD version 6.3 has been released. OpenBSD is demonstrating to be an excellent server operating system. Security is more critical now than ever before. OpenBSD leads the pack when it comes to security features. OpenBSD provides a very robust and trustworthy system that comes with the cutting-edge security feature. OpenBSD 6.3 continues to offer the “multi-platform, ultra-secure operating system” experience. The OpenBSD team releases a new version every six months.
Like any good sysadmin, I kept my servers and desktop side up to date and patched all the time. However, recent Java updates have broken my IPMI KVM Java Applets on Dell, IBM, HP, Supermicro and FreeNAS mini servers. You will get an error that read as follows:
Unsigned application requesting unrestricted access to system. The following resource is signed with a weak signature algorithm MD5withRSA and is treated as unsigned.
A professional cable installation and a cable management solution is a dream for any sysadmin or IT team. Here are some of the best looking data centers cabling that could be considered as
porn art for the network and sysadmin users.
Cloud storage is nothing but an enterprise-level cloud data storage model to store the digital data in logical pools, across the multiple servers. You can use a hosting company such as Amazon, Google, Rackspace, Dropbox and others for keeping your data available and accessible 24×7. You can access data stored on cloud storage via API or desktop/mobile apps or web based systems.
In this post, I’m going to list amazingly awesome open source cloud storage engines that you can use to access and sync your data privately for security and privacy reasons.
Can’t write to the hard disk on a Linux or Unix-like systems? Want to diagnose corrupt disk issues on a server? Want to find out why you are getting “disk full” messages on screen? Want to learn how to solve full/corrupt and failed disk issues. Try these eight tips to diagnose a Linux and Unix server hard disk drive problems.
Cloning is nothing but the copying of the contents of a server hard disk to a storage medium (another disk) or to an image file. Disk cloning is quite useful in modern data centers for:
- Full system backup.
- System recovery.
- Reboot and restore.
- Hard drive upgrade.
- Converting a physical server to virtual machine and more.
In this post, I am going to list the Free and Open Source Cloning Software for Disk Imaging and Cloning that you can use for GNU/Linux, *BSD and Mac OS X desktop operating systems.