Month: January 2015

Learn | Teach Open Source Technologies

The GHOST Vulnerability Bug discovered by researchers at Qualys Inc. in Linux glibc library

  Courtesy: https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability The GHOST vulnerability is a serious weakness in the Linux glibc library. It allows attackers to remotely take complete control of the victim system without having any prior knowledge of system credentials. CVE-2015-0235 has been assigned to this issue.

Open Creativity !!! Fedora Design Suite Spin

Looking for a ready-to-go desktop environment brimming with free and open source multimedia production and publishing tools? Try the Design Suite, a Fedora Spin created by designers, for designers.

Ubuntu Core on Internet Things

Ubuntu Core on Internet Things 20 January 2015, by Canonical New Snappy Ubuntu Core on smart devices delivers bullet-proof security, reliable updates and the enormous Ubuntu ecosystem at your fingertips – bringing the developer’s favourite cloud platform to a wide range of internet things, connected devices and autonomous machines. “We are inspired to support entrepreneurs and…
Read more

How to Install JBOSS Network Operation with PostGreSQL and RHQ Agent

How to Install JBOSS Network Operation with  PostGreSQL and RHQ Agent Pre requisites! Kernel Update Host File Setting Centos 6 x86_64 Oracle Java JDK 1.6.0_45 POSTGRESQL Jon-server_3.2.0

How to Install RHQ on CentOS 6.5

Install PosgreSQL 3.1.1. Type ‘yum install postgresql*’ making sure to include the asterisk (*) 3.1.2. Type ‘y’ when prompted (happens twice) Confirm java version 4.1.    Type ‘java –version’ 4.2.    Confirm it’s running at least 1.6 and using OpenJDK (or Oracle/Sun Java or JRockit, but NOT GNU Libgcj)

VPN CLIENT INSTALLATION on Linux

VPN INSTALLATION on Linux [root@app-01 ~]# uname -a Linux app-01 2.6.32-431.11.2.el6.x86_64 #1 SMP Tue Mar 25 19:59:55 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux [root@app-01 /]# mkdir download [root@app-01 /]# cd download/ [root@app-01 download]# ll total 0 [root@app-01 download]# mkdir vpn [root@app-01 download]# cd vpn/ [root@app-01 vpn]# ll total 0

How to verify DDOS attack with netstat command on Linux Terminal

How to verify DDOS attack with netstat command on Linux Terminal Some examples with explanation netstat -na This display all active Internet connections to the server and only established connections are included. netstat -an | grep :80 | sort

How to Install & configure APACHE GRAPH BASED MONITORING USING DARKSTAT

APACHE GRAPH BASED MONITORING USING DARKSTAT Use for verification apache benchmark tool for Graph statistics collect. Apache benchmark 10000 requests concurrency Results. [root@mysql01 ~]# yum install httpd [root@mysql01 ~]# /etc/init.d/httpd start [root@mysql01 ~]# rpm -Uvh libpcap-0.9.4-15.el5.x86_64.rpm