What a nice way to finish a week – three pieces of really good news all in one announcement! Kali Linux (the successor to BackTrack), well known as one of the premier distributions for digital forensics and penetration testing, announced a new release. This by itself already qualifies as very good news. With this release, Kali-Rolling (2016.1), Kali Linux is now officially a rolling distribution. Kali was previously based on the Debian stable distribution, and basically had to track the major release cycles of Debian with their own major releases. Now Kali is based on the Debian testing distribution, so it is continuously updated. The Kali developers have also added continuous notification and updates of the penetration testing tools that they add to Debian to create the Kali distribution.
Securing a system in a production from the hands of hackers and crackers is a challenging task for a System Administrator. This article related is to How to Secure Linux box or Hardening a Linux Box. In this article We’ll explain 25 useful tips & tricks to secure your Linux system
Observium is a PHP/MySQL driven Network Observation and Monitoring application, that supports a wide range of operating systems/hardware platforms including, Linux, Windows, FreeBSD, Cisco, HP, Dell, NetApp and many more. It seeks to present a robust and simple web interface to monitor health and performance of your network.
Credit card users could have their PINs stolen, and merchants could have their bank accounts pillaged, in a set of attacks demonstrated by researchers Karsten Nohl and Fabian Bräunlein at the Chaos Computing Club security conference. Much research has been done into the chips found on credit cards and the readers and number pads used with these cards, but Nohl decided to take a different approach, looking instead at the communications protocols used by those card readers. There are two that are significant; the first, ZVT, is used between point of sale systems and the card readers. The second, Poseidon, is used between the card reader and the merchant’s bank. Nohl found that both had important flaws.
Puppet is an automation tool which allows you to automate the configuration of software like apache and nginx across multiple servers. Puppet installation In this tutorial we will be installing Puppet in the Puppet/Agent mode.You can install it in a Stand Alone mode as well. OS & software Versions Centos 6.5 Linux kernel 2.6.32 Puppet 3.6.2
It’s not just knowing how to set up and maintain your servers and understanding how system commands work that makes you a good system administrator — or even knowing how to fix things when something breaks down, how to monitor performance, how to manage backups, or how to craft superbly clever scripts. It’s knowing these things and holding yourself to a set of cardinal rules that help to keep your systems running smoothly and your users happy.
IT leaders share their tips on how to keep pace with technology change.
The Indian government is working on its operating system named BOSS, and it’s planning on ditching any kind of Microsoft-related application.
When faced with a business challenge, business leaders often have a good idea where they need to go and how they must evolve. But there is often a mismatch in how prepared they perceive their organization to be, and the cold, hard reality within their walls. This is especially true when it comes to the challenges associated with the way digital technology is reshaping our future.