Web HostingWeb Hosting

HowTo: Up and Running with oVirt 3.4

Last week, the oVirt Project delivered a new version of its open source virtualization management system, complete with a feature I’ve eagerly awaited for the past two years. The feature, called Hosted Engine, enables oVirt admins to host the system???s management server (aka the engine) on one of the virtualization hosts it manages. This article walks through the installation and first steps of a basic oVirt install using the Hosted Engine feature.

Complete Story

7 habits of highly successful Unix admins

You can spend 50-60 hours a week managing your Unix servers and responding to your users’ problems and still feel as if you’re not getting much done or you can adopt some good work habits that will both make you more successful and prepare you for the next round of problems.

Complete Story

 

Top 10 security tools in Kali Linux 1.0.6

When it comes to forensics, penetration and security testing Kali Linux – which is designed for security professionals and packed with more than 300 security testing tools — is arguably the most developed of the Linux distributions. Available in 32 bit, 64 bit, ARM, Live USB, and VMware versions, Kali Linux is maintained and funded by Offensive Security Ltd. Version 1.0.6 released on January 9, 2014 delivers a host of improvements, including the switch to Debian and use of an FHS-compliant system.

Read this full article at Network World

Open source alternatives for small businesses

There are dozens of other excellent alternative solutions to proprietary software and thousands of open source projects that can serve small businesses. It can sometimes be difficult to select the software which best matches specific needs, but there are plenty of people globally willing to help you make those decisions and help take small businesses down the path to an open and productive future.

Complete Story

An Introduction to the AWS Command Line Tool

Amazon Web Services has an extremely functional and easy to use web console called the AWS Management Console. It’s brilliant for performing complex tasks on your AWS infrastructure, although as a Linux sysadmin, you may want something more “console” friendly.

In early September 2013, Amazon released version 1.0 of awscli, a powerful command line interface which can be used to manage AWS services.

Complete story

Red Hat Enterprise Virtualization Scores Major Cloud Win

Red Hat (RHT) is taking off in the world of open source virtualization solutions for the cloud—or it has scored a major enterprise customer, at least. This week, it announced that British Airways (BA) is deploying the Red Hat Enterprise Virtualization platform to power its private cloud, an important win for a Red Hat product that until now has seen few enterprise adoptions on this scale.

The Red Hat product will power both the BA website, which sees traffic of 450,000 visitors on an average day, and internal BA cloud applications. The deployment involves 750 virtual machines on 130 hosts spread across two data centers.

Complete Story

Why open source will rule the data center

Open is playing an increasingly vital role in IT infrastructure. The current, dominant position of open source in server-side computing is well understood, and networking is now edging its way toward open source with the OpenDaylight movement. But is open source a natural evolutionary path for all IT disciplines, or do certain characteristics make some areas more attractive for open source than others?

When we think about networking as an industry, for example, we tend to compare its progress to the evolutionary track taken by the compute world. The assumption is that the networking industry will unfold in much the same way that the server industry did, marching past similar milestones. But this view of the world assumes that evolution follows a two-dimensional track, and industries are either parked somewhere along the continuum or they’re moving toward a predetermined end.

Complete Story

Frame attack injects code via PNGs

Security vendor Sucuri is warning that it’s spotted an attack in the wild that embeds malicious code in PNG files. The iFrame injection attack loaded a valid jquery.js file with very little to alert even the researcher that something else was going on. As the company writes in this blog post, the only red flag in the code was a loadFile() function downloading dron.png into the iFrame.

Read this full article at The Register UK

11 sure signs you’ve been hacked

In today’s threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable. To combat this, many antimalware programs monitor program behaviors, often called heuristics, to catch previously unrecognized malware. Other programs use virtualized environments, system monitoring, network traffic detection, and all of the above at once in order to be more accurate. And still they fail us on a regular basis.

Read this full article at TechWorld


Hackers use a trick to deliver Zeus banking malware

Zeus is encrypted and contained in an “.enc” file, which security products allow through, according to Malcovery Security Hackers found a new way to slip past security software and deliver Zeus, a long-known malicious software program that steals online banking details. Security company Malcovery Security, based in Georgia, alerted security analysts after finding that none of 50 security programs on Google’s online virus scanning service VirusTotal were catching it as of early Sunday.

Read this full article at TechWorld