Last week, the oVirt Project delivered a new version of its open source virtualization management system, complete with a feature I’ve eagerly awaited for the past two years. The feature, called Hosted Engine, enables oVirt admins to host the system???s management server (aka the engine) on one of the virtualization hosts it manages. This article walks through the installation and first steps of a basic oVirt install using the Hosted Engine feature.
You can spend 50-60 hours a week managing your Unix servers and responding to your users’ problems and still feel as if you’re not getting much done or you can adopt some good work habits that will both make you more successful and prepare you for the next round of problems.
When it comes to forensics, penetration and security testing Kali Linux – which is designed for security professionals and packed with more than 300 security testing tools — is arguably the most developed of the Linux distributions. Available in 32 bit, 64 bit, ARM, Live USB, and VMware versions, Kali Linux is maintained and funded by Offensive Security Ltd. Version 1.0.6 released on January 9, 2014 delivers a host of improvements, including the switch to Debian and use of an FHS-compliant system.
There are dozens of other excellent alternative solutions to proprietary software and thousands of open source projects that can serve small businesses. It can sometimes be difficult to select the software which best matches specific needs, but there are plenty of people globally willing to help you make those decisions and help take small businesses down the path to an open and productive future.
Amazon Web Services has an extremely functional and easy to use web console called the AWS Management Console. It’s brilliant for performing complex tasks on your AWS infrastructure, although as a Linux sysadmin, you may want something more “console” friendly.
Red Hat (RHT) is taking off in the world of open source virtualization solutions for the cloud—or it has scored a major enterprise customer, at least. This week, it announced that British Airways (BA) is deploying the Red Hat Enterprise Virtualization platform to power its private cloud, an important win for a Red Hat product that until now has seen few enterprise adoptions on this scale.
The Red Hat product will power both the BA website, which sees traffic of 450,000 visitors on an average day, and internal BA cloud applications. The deployment involves 750 virtual machines on 130 hosts spread across two data centers.
Open is playing an increasingly vital role in IT infrastructure. The current, dominant position of open source in server-side computing is well understood, and networking is now edging its way toward open source with the OpenDaylight movement. But is open source a natural evolutionary path for all IT disciplines, or do certain characteristics make some areas more attractive for open source than others?
When we think about networking as an industry, for example, we tend to compare its progress to the evolutionary track taken by the compute world. The assumption is that the networking industry will unfold in much the same way that the server industry did, marching past similar milestones. But this view of the world assumes that evolution follows a two-dimensional track, and industries are either parked somewhere along the continuum or they’re moving toward a predetermined end.
Security vendor Sucuri is warning that it’s spotted an attack in the wild that embeds malicious code in PNG files. The iFrame injection attack loaded a valid jquery.js file with very little to alert even the researcher that something else was going on. As the company writes in this blog post, the only red flag in the code was a loadFile() function downloading dron.png into the iFrame.
In today’s threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable. To combat this, many antimalware programs monitor program behaviors, often called heuristics, to catch previously unrecognized malware. Other programs use virtualized environments, system monitoring, network traffic detection, and all of the above at once in order to be more accurate. And still they fail us on a regular basis.
Zeus is encrypted and contained in an “.enc” file, which security products allow through, according to Malcovery Security Hackers found a new way to slip past security software and deliver Zeus, a long-known malicious software program that steals online banking details. Security company Malcovery Security, based in Georgia, alerted security analysts after finding that none of 50 security programs on Google’s online virus scanning service VirusTotal were catching it as of early Sunday.