Web HostingWeb Hosting

Hand-on with Kali Linux Rolling

What a nice way to finish a week – three pieces of really good news all in one announcement! Kali Linux (the successor to BackTrack), well known as one of the premier distributions for digital forensics and penetration testing, announced a new release. This by itself already qualifies as very good news. With this release, Kali-Rolling (2016.1), Kali Linux is now officially a rolling distribution. Kali was previously based on the Debian stable distribution, and basically had to track the major release cycles of Debian with their own major releases. Now Kali is based on the Debian testing distribution, so it is continuously updated. The Kali developers have also added continuous notification and updates of the penetration testing tools that they add to Debian to create the Kali distribution.

Read this full article at ZDNet Security

25 Hardening Security Tips for Linux Servers

Securing a system in a production from the hands of hackers and crackers is a challenging task for a System Administrator. This article related is to How to Secure Linux box or Hardening a Linux Box. In this article We’ll explain 25 useful tips & tricks to secure your Linux system

Complete Story

Observium: A Complete Network Management and Monitoring System for RHEL/CentOS

Observium is a PHP/MySQL driven Network Observation and Monitoring application, that supports a wide range of operating systems/hardware platforms including, Linux, Windows, FreeBSD, Cisco, HP, Dell, NetApp and many more. It seeks to present a robust and simple web interface to monitor health and performance of your network.

Complete Story

Common payment processing protocols found to be full of flaws

Credit card users could have their PINs stolen, and merchants could have their bank accounts pillaged, in a set of attacks demonstrated by researchers Karsten Nohl and Fabian Br√§unlein at the Chaos Computing Club security conference. Much research has been done into the chips found on credit cards and the readers and number pads used with these cards, but Nohl decided to take a different approach, looking instead at the communications protocols used by those card readers. There are two that are significant; the first, ZVT, is used between point of sale systems and the card readers. The second, Poseidon, is used between the card reader and the merchant’s bank. Nohl found that both had important flaws.

Read this full article at Dark Reading

How to delete a single command from history on a Linux, OS X and Unix Bash shell

 Nixcraft: Deleting command history can be very useful

Automating Linux Server Configs with Puppet

Puppet is an automation tool which allows you to automate the configuration of software like apache and nginx across multiple servers. Puppet installation In this tutorial we will be installing Puppet in the Puppet/Agent mode.You can install it in a Stand Alone mode as well. OS & software Versions Centos 6.5 Linux kernel 2.6.32 Puppet 3.6.2

Complete Story

18 cardinal rules of systems administration

Rules to live by

It’s not just knowing how to set up and maintain your servers and understanding how system commands work that makes you a good system administrator — or even knowing how to fix things when something breaks down, how to monitor performance, how to manage backups, or how to craft superbly clever scripts. It’s knowing these things and holding yourself to a set of cardinal rules that help to keep your systems running smoothly and your users happy.

Complete story

9 ways to make your IT department move faster

IT leaders share their tips on how to keep pace with technology change.

Complete Story

India Wants to Replace Windows with the Debian-Based BOSS

The Indian government is working on its operating system named BOSS, and it’s planning on ditching any kind of Microsoft-related application.

Complete Story

Digital transformation is a survival issue

When faced with a business challenge, business leaders often have a good idea where they need to go and how they must evolve. But there is often a mismatch in how prepared they perceive their organization to be, and the cold, hard reality within their walls. This is especially true when it comes to the challenges associated with the way digital technology is reshaping our future.

Complete story