You can dump Linux or Unix server memory. This is useful for forensics analysis, and testing your own system. This is often desirable to see:
- What code and what data actually resides in memory.
- You can search for specific pids memory.
- Search memory for string and other data such as passwords.
- Works as add-on tool for gdb and others.
- Search/replace/dump memory from running processes and core files.
- All kinds of deep hacking activities that simply saves your time and solve problems.
The nicstat command is top like utility for network interface card (NIC). It displays information and statistics about all your network card such as packets, kilobytes per second, average packet sizes and more. It works under Solaris and Linux operating systems.
In this post, I will explain how to install and use the nicstat command to find out stats about your NICs under Debian / Ubuntu / RHEL / CentOS Linux operating systems.
The most sysadmin will run low on disk space or storage space. Users will demand more disk space, and you need to free storage space. You will find out files that are a waste of space and delete it or move to an archive medium. However, how do you find the right files to delete that can help recover maximum space? Say hello to agedu tool (pronounced as ‘age dee you’) – it scans a directory tree and produces reports about how much disk space is used in each directory and subdirectory, and also how that usage of disk space corresponds to files with last-access times a long time ago. In other words, this command might help you to free up disk space.
I carry my Linux powered laptop just about everywhere. How do I protect my private data stored on partition or removable storage media against bare-metal attacks where anyone can get their hands on my laptop or usb pen drive while traveling?
Worried about my data.
Most embedded Linux / BSD systems such as routers, servers and nas devices comes with console interface (serial port with RS-232). BIOS can uses this, and after boot BIOS screen I/O is redirected so that you can use the device. RS-232 is also used for communicating to headless server, where no monitor or keyboard is installed, during boot when operating system is not running yet and therefore no network connection is possible. You need to use a serial cable between your computer and embedded system or server. In this post I will cover five conman utilities used for serial communication under Linux / Unix / *BSD and Mac OS X.
Gabe Newell is the co-founder and managing director of the video game development and online distribution company called Valve Corporation. He want to port 2500 game titles on Linux. But, why? First, Gabe hates Windows 8. He recently made a rare appearance last night at Casual Connect, an annual videogame conference in Seattle.
Dell has announced that it has updated its business grade mobile workstation laptop line with new Intel Ivy Bridge CPUs, graphics card and comes with preloaded with RHEL 6. Theses systems are designed as replacement for desktop workstations and targeted at professionals, engineers, scientists, and users who need powerful hardware on the move for advanced analysis, engineering, manufacturing and design applications.
OS X Mountain Lion has been released and available for download. This new release comes with over 200 new features such as Twitter integration, Apple’s Game Center, iMessage services, and a new security feature called Gatekeeper to protect users from malware. However, new operating system is not compilable with all mac computers.
The iotop command is top like utility for disk I/O. It watches I/O usage information output by the Linux kernel (requires v2.6.20 or later) and displays a table of current I/O usage by processes or threads on the system. This post expalins how to install and use iotop to find out what’s stressing (or program names) on your hard drives under Linux operating systems.