Sign in or Join FriendFeed
FriendFeed is the easiest way to share online. Learn more »
sysadmin

sysadmin

A room to share about system administration
imabonehead
How to Back Up Terabytes of Databases | Brent Ozar Unlimited® by Brent Ozar Unlimited® - http://www.brentozar.com/archive...
How to Back Up Terabytes of Databases | Brent Ozar Unlimited® by Brent Ozar Unlimited®
"When you weren’t looking, your databases went and grew up. Now your backup window has grown so large that you’re about ready to open it and jump. Time to make a choice. The Native Way: Tuning SQL Server Backups You can theoretically pull this off by using a combination of tactics..." - imabonehead from Bookmarklet
imabonehead
Hands-on with Canonical’s Orange Box and a peek into cloud nirvana | Ars Technica - http://arstechnica.com/informa...
Hands-on with Canonical’s Orange Box and a peek into cloud nirvana | Ars Technica
Show all
"Take ten high-end Intel NUCs, a gigabit Ethernet switch, a couple of terabytes of storage, and cram it all into a fancy custom enclosure. What does that spell? Orange Box." - imabonehead from Bookmarklet
imabonehead
▶ Can You Imagine Life Without SysAdmins? - YouTube - http://www.youtube.com/watch...
▶ Can You Imagine Life Without SysAdmins? - YouTube
Play
"To celebrate SysAdmin Day 2014, SysAid presents an alternative reality that is completely bizarre in this hilarious video. Enjoy!" - imabonehead from Bookmarklet
imabonehead
"When users make your life hard, Sophos makes your life easy. We salute you, IT Pros and System Admin professionals, with 12 Days of Sysmas: http://soph.so/z3VtB" - imabonehead from Bookmarklet
imabonehead
"What do Niagara Falls, wild horses, and a slow-motion explosion have in common? They're all freaking mind-bogglingly awesome. Just like you, IT PRO, magnificent specimen that you are. So, we took our epic SysAdmin Day song and karaokified it with insanely bad ass visuals that will leave you forever a changed Server Samurai. Clear your throat, mic up, and get ready to bellow out some IT pro lyrical poetry. You're welcome. Lyrics by Spiceworks Studios and the Spiceworks Community. Music by Travis Hagan." - imabonehead from Bookmarklet
imabonehead
Out in the Open: Inside the Operating System Edward Snowden Used to Evade the NSA | Enterprise | WIRED - http://www.wired.com/2014...
Out in the Open: Inside the Operating System Edward Snowden Used to Evade the NSA | Enterprise | WIRED
"When NSA whistle-blower Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications. But this month, we learned that Snowden used another technology to keep his communications out of the NSA’s prying eyes. It’s called Tails. And naturally, nobody knows exactly who created it." - imabonehead from Bookmarklet
Che sia *per caso* questo?https://tails.boum.org - Luca Perencin (No_CQRT) from Android
imabonehead
"We were able to find five models from iXsystems with the FreeNAS Mini product name. Systems come with 16TB, 12TB, 8TB, 4TB, or without storage drives. The new FreeNAS Mini uses an Intel Avoton 8-core SoC processor and pairs the system with 16GB of ECC DRAM. Hardware wise, this is a massive increase in processing power from the off-the-shelf NAS products we normally test, including even some of the larger rackmount systems. To put this into perspective, over the last twelve months, an average NAS on our test bench used an Intel Atom dual-core processor with HyperThreading and shipped with 2-4GB of system DRAM." - imabonehead from Bookmarklet
imabonehead
▶ Google I/O 2014 - HTTPS Everywhere - YouTube - http://www.youtube.com/watch...
▶ Google I/O 2014 - HTTPS Everywhere - YouTube
Play
"Data delivered over an unencrypted channel is insecure, untrustworthy, and trivially intercepted. We must protect the security, privacy, and integrity of our users data. In this session we will take a hands-on tour of how to make your websites secure by default: the required technology, configuration and performance best practices, how to migrate your sites to HTTPS and make them user and search friendly, and more. Your users will thank you." - imabonehead from Bookmarklet
imabonehead
Using LVM’s new cache feature | Richard WM Jones - http://rwmj.wordpress.com/2014...
Using LVM’s new cache feature | Richard WM Jones
"If you have a machine with slow hard disks and fast SSDs, and you want to use the SSDs to act as fast persistent caches to speed up access to the hard disk, then until recently you had three choices: bcache and dm-cache are both upstream, or Flashcache/EnhanceIO. Flashcache is not upstream. dm-cache required you to first sit down with a calculator to compute block offsets. bcache was the sanest of the three choices. But recently LVM has added caching support (built on top of dm-cache), so in theory you can take your existing logical volumes and convert them to be cached devices." - imabonehead from Bookmarklet
Can't wait for the benchmarks against ZFS's Hybrid Storage Pools… - Jean-Marc Liotier
imabonehead
"SigmaVPN is simple, light-weight and modular VPN software for UNIX systems, deploying the NaCl encryption library. It's easy to configure, has low overheads and is reliable. No longer is it necessary to waste precious time configuring overcomplicated tunnels." - imabonehead from Bookmarklet
imabonehead
"You may remember MEGACORE, the monster of a server we built for the FreeBSD Foundation. Recently one of our clients had specific networking requirements for a 2U/4 node solution, so we came up with a custom build that fit all of their needs. Meet "MEGAPORT". To get an idea of how impressive this system is, we have to look at it piece by piece. First, we outfitted a 2U with four compute nodes." - imabonehead from Bookmarklet
"Each of the four compute nodes is providing Dual 10-core Intel CPU's, resulting in a total of 80 physical cores packed in 2U of rack space." - imabonehead
"There’s 256GB of RAM in each of the 4 nodes, providing a total of 1TB of memory. With 6 x 10Gbe (4 x Intel SFP+ 10GbE ports and 2 x Intel X540 RJ45 10GbE ports) in each of the 4 nodes, that’s 24 x 10GbE ports in 2U of rack space." - imabonehead
imabonehead
Supermicro Releases 112 Node 6U Server | STH – Server and Workstation Reviews - http://www.servethehome.com/supermi...
Supermicro Releases 112 Node 6U Server | STH – Server and Workstation Reviews
"At CeBIT this week, Supermicro released a 112 node, 6U server that certainly ups density a considerable amount. The 112 node blade server is based on the Intel Atom C2000 family with up to 8 cores per node. This is a fairly significant achievement since that means about 18.6 nodes per U. (112/ 6) including networking." - imabonehead from Bookmarklet
"One can see that the front of the chassis has what appears to be two rows of 14 sleds. That would mean each sled has 4 nodes. The rear of the chassis appears to have 8x 1600w redundant power supplies, two chassis management modules and four switching modules." - imabonehead
That needs a significant amount of power still. I would not be able to fill a rack with those due to power. - Eric - For You Wack MCs! from iPhone
imabonehead
Microsoft reveals its server designs and releases open source code | Ars Technica - http://arstechnica.com/informa...
Microsoft reveals its server designs and releases open source code | Ars Technica
Microsoft reveals its server designs and releases open source code | Ars Technica
"Redmond joins Facebook's Open Compute, intends to make servers more efficient." - imabonehead from Bookmarklet
imabonehead
""kGraft is intended to be merged into the upstream Linux kernel and to become a living open-source project," Pavlik said. "It builds on and improves existing Linux infrastructure to fit seamlessly into the Linux kernel." Pavlik noted that a key difference between Ksplice and kGraft is the upstream kernel approach. Pavlik noted that Ksplice tried – and failed – to get upstream acceptance in 2008, primarily because of the complexity of the changes required." - imabonehead from Bookmarklet
imabonehead
Introducing kpatch: Dynamic Kernel Patching | Red Hat Enterprise Linux Blog - http://rhelblog.redhat.com/2014...
"In upstream development news, the kernel team here at Red Hat has been working on a dynamic kernel patching project called kpatch for several months. At long last, the project has reached a point where we feel it’s ready for a wider audience and are very excited to announce that we’ve released the kpatch code under GPLv2. kpatch allows you to patch a Linux kernel without rebooting or restarting any processes. This enables sysadmins to apply critical security patches to the kernel immediately, without having to wait for long-running tasks to complete, users to log off, or scheduled reboot windows. It gives more control over uptime without sacrificing security or stability." - imabonehead from Bookmarklet
ↂGiorgiँ Zarrelliↂ
Si vede che sono un sistemista e non un programmatore: la parte più bella dello script che ho creato è quella che si occupa di generare i log dell'applicazione: sono chiari, precisi, formattati per benino e pure con un time stamp leggibile, tié. Ah, si poi il programma funziona, ma è un di più :-D
imabonehead
Video demo of live Linux Kernel Patching using kGraft - YouTube - http://www.youtube.com/watch...
Video demo of live Linux Kernel Patching using kGraft - YouTube
Play
Better than ksplice? - Julian
imabonehead
Supermicro A1SAM-2750F Review finally a mATX dual PCIe slot platformSTH – Server and Workstation Reviews - http://www.servethehome.com/Server-...
Supermicro A1SAM-2750F Review finally a mATX dual PCIe slot platformSTH – Server and Workstation Reviews
Show all
"The Supermciro A1SAM-2750F is a larger micro ATX form factor measuring 9.6 in x 9.6 in. The Marvell Ethernet transceiver sits just behind the quad Gigabit Ethernet ports. This is a standard feature on Supermicro’s Intel Atom C2000 line at this point and has worked well in the five or so months we have been testing these motherboards. The third large IC on the motherboard is the ASpeed AST2400 BMC which provides features such as out of band management and video out." - imabonehead from Bookmarklet
imabonehead
▶ AT&T Archives: The UNIX Operating System - YouTube - http://www.youtube.com/watch...
▶ AT&T Archives: The UNIX Operating System - YouTube
Play
"This film "The UNIX System: Making Computers More Productive", is one of two that Bell Labs made in 1982 about UNIX's significance, impact and usability. Even 10 years after its first installation, it's still an introduction to the system. The other film, "The UNIX System: Making Computers Easier to Use", is roughly the same, only a little shorter. The former film was geared towards software developers and computer science students, the latter towards programmers specifically. The film contains interviews with primary developers Ritchie, Thompson, Brian Kernighan, and many others." - imabonehead from Bookmarklet
imabonehead
Change Mellanox ConnectX-3 VPI Cards between Infiniband and EthernetServeTheHome – Server and Workstation Reviews - http://www.servethehome.com/change-...
Change Mellanox ConnectX-3 VPI Cards between Infiniband and EthernetServeTheHome – Server and Workstation Reviews
Show all
"One popular model we are using is the Mellanox MCX354A-FCBT which is a dual port ConnectX-3 VPI model. Each of the two QSFP+ ports can easily be configured either to run in Inifiniband or Ethernet mode. In Infiniband mode the cards run well at 56gbps (FDR) or 40gbps (QDR) speeds. In Ethernet mode the cards can run in either 40 gigabit or 10 gigabit speeds. The net result is that these cards are excellent RDMA capable cards which is an important feature for fast networking." - imabonehead from Bookmarklet
imabonehead
Creating a low power Hyper-V based ZFS napp-it pfsense / vyatta AIOServeTheHome – Server and Workstation Reviews - http://www.servethehome.com/low-pow...
Creating a low power Hyper-V based ZFS napp-it pfsense / vyatta AIOServeTheHome – Server and Workstation Reviews
Creating a low power Hyper-V based ZFS napp-it pfsense / vyatta AIOServeTheHome – Server and Workstation Reviews
"Recently I decided to embark upon a project of creating a Hyper-V based ZFS backup target with napp-it web GUI plus either a pfsense or vyatta virtual machine running router and firewall services. The other aspect to this is that I wanted to use a minimal amount of power since this would be an always on appliance. On the Hyper-V side the decision was driven by a few factors bit it did complicate the setup significantly over the standard VMware ESXi 5.5, OpenSolaris derivative and pfsense or vyatta all-in-one formula that I had tried and is well documented. Likely not a fully production ready setup as of now, but instructive as to what one may accomplish at least for lab environments." - imabonehead from Bookmarklet
imabonehead
HonSSH - A high interaction honeypot solution for Linux based systems - BruteForce Lab's Blog - http://bruteforce.gr/honssh-...
HonSSH - A high interaction honeypot solution for Linux based systems - BruteForce Lab's Blog
"Honeypots have been hard to deploy. Many techniques required you to install software on the honeypots themselves that send information about what is happening on the system back to a collector/sensor. This strategy has worked most of the times, but the reporting software have in some cases rendered the honeypots unusable and the attackers have sometimes been able to detect it." - imabonehead from Bookmarklet
"Late summer of 2013, I came across a Python project that – while far from being a “silver bullet” – had great potential and worked amazingly well. It was easy to deploy and configure and solved a lot of issues with the de facto way we deploy honeypots. The project is called HonSSH. As described on its project page (https://code.google.com/p...)..." - imabonehead
imabonehead
NYC Tech Talk Series: How Google Backs Up the Internet - YouTube - http://www.youtube.com/watch...
NYC Tech Talk Series: How Google Backs Up the Internet - YouTube
Play
"Systems like GMail and Picasa keep massive amounts of data in the cloud, all of which has to be constantly backed up to prepare for the inevitable. Typical backup and recovery techniques don't scale, so Google has devised new methods for securing unprecedented volumes of data against every type of failure. There are many unique challenges, both obvious and subtle, in delivering storage systems at this scale; we'll discuss these and their solutions as well as some alternatives that didn't make the grade." - imabonehead from Bookmarklet
Kevin Johnson
jq - command-line tool for slicing and dicing json files on the command line - http://stedolan.github.io/jq/
jq - command-line tool for slicing and dicing json files on the command line
imabonehead
29 Practical Examples of NMAP Commands for Linux System/Network Administrators - http://www.tecmint.com/nmap-co...
29 Practical Examples of NMAP Commands for Linux System/Network Administrators
"The Nmap aka Network Mapper is an open source and a very versatile tool for Linux system/network administrators. Nmap is used for exploring networks, perform security scans, network audit and finding open ports on remote machine. It scans for Live hosts, Operating systems, packet filters and open ports running on remote hosts." - imabonehead from Bookmarklet
imabonehead
"The first stable release was Bareos 12.4 in April 2013 (the version number stands for the year and the quarter of the feature freeze). The current beta is version 13.2. On September 25, 2013, at the Open Source Backup Conference, formerly known as the Bacula Conference, the Bareos project was introduced to an interested audience." - imabonehead from Bookmarklet
imabonehead
Creating a Captive Portal Using Linux and LDAP or Active Directory | Phil Allred - http://philallred.blogspot.com/2012...
"I came across some nice code on Andy Beverley's web page on creating a captive portal. We had the need for something like this at Brooklyn Law School. Brooklyn Law School uses two wireless networks with over 200 access points -- one in the residence halls, and one in the classrooms. They are both great systems, Unifi and Aruba. Each has its strong points, and by using a mixture, we saved the school about $200,000 over the aruba-only solution. However, neither one's captive portal technology could accept traffic from the other one. We had used Bluesocket for this purpose before, but an updated Bluesocket controller would have cost in the tens of thousands of dollars." - imabonehead from Bookmarklet
imabonehead
SFTP Jail (chroot) with Active Directory authentication - http://www.heitorlessa.com/sftp-ja...
SFTP Jail (chroot) with Active Directory authentication
"You may find loads of articles how to do a SFTP using SSH as well as a Jail, however only few websites provide a How To authenticate against an existent Active Directory. Moreover, you may find hard using winbind to join your Linux into the Windows domain, so this article here shows how to do the same thing in a simple manner." - imabonehead from Bookmarklet
imabonehead
[P]Delete: Configuring PEAP authentication with FreeRADIUS - http://phucnw.blogspot.com/2013...
[P]Delete: Configuring PEAP authentication with FreeRADIUS
Show all
"PEAP (Protected Extensible Authentication Protocol) is an authentication method based in two simple steps: The client establishes a TLS session with the server. The server authenticates the client over the same digital certified with a RADIUS server. This allows EAP use insecure authentication protocols like MS-CHAP v2 (Microsoft version of CHAP used in this tutorial because is the default type supported by windows clients) with a secure tunnel. RADIUS (Remote Authentication Dial In User Service) is a network protocol that provides Authentication, Authorization and Accounting to connect network services. I’ll configure a simple scenario with an access point authenticating the wireless access with FreeRADIUS..." - imabonehead from Bookmarklet
imabonehead
Eliminate banner grabbing in Apache Tomcat - http://www.ibm.com/develop...
Eliminate banner grabbing in Apache Tomcat
"In this article, I demonstrate a three-step procedure for securing your Tomcat web server against banner grabbing, the technique hackers use to discover valuable information about an application or enterprise architecture, which they may then be able to use in a cyber attack." - imabonehead from Bookmarklet
Other ways to read this feed:Feed readerFacebook