Java EE 7 released and Packt Publishing is having 50% sales
Before and after Oracle was buying Sun, the development of the Java language slowed down. But now Oracle is picking up speed. The Java Enterprise Edition 6 was released in December 2009 but now this...
View ArticleLinux File and Special Permission
File PermissionThe simplest file permission in Linux are the r (read), w (write), x (executable). These file permission yields for u (user), g (group) and o (other). They can be set both: Symbolically:...
View ArticleCommon vi commands
Most Linux server runs without a graphical interface and the most sure installed editor for file is the vi editor. But getting used with vi can be a little challenging. Below I will show you the most...
View ArticleAccessing Network Files via NFS and CIFS in Linux
Working with remote file system under Linux is not hard. Below I will show how to use the two most common remote file system used: NFS - Network File SystemCIFS - Common Internet File SystemNFS Show...
View ArticleRHEL: How to Switch Users in Multiuser Runlevels
Switching User To switch to a different user, e.g. student, run To switch to root RunlevelsMost Linux distribution can be ran in 5 different runlevels. Runlevel 0 and 6 are special, which you can see...
View ArticleSecuring SSH with Public/Private Key Authentication
The motive for using public/private key authentication are:Firstly for convinience, you no longer need to enter password (unless you encrypt your keys with password protected).Secondly, ones setup, you...
View ArticleHow to Mount an USB Device in Linux
Short Version1. Before inserting the USB, check which disks you already have.2. Create a new directory under /mnt to which you will mount your USB.3. Now insert the USB and mount it.4. Now you are...
View ArticleManaging Partions With RHEL 6
IntroductionMost Linux distrobution, which is also the case with RHEL 6, uses the MBR (Master Boot Record) partitioning format. The MBR is designed to hold up to maximum 4 primary partition. If more is...
View ArticleManaging Swap Space in RHEL 6
IntroductionThe swap space is used by the OS to handle overflow for parts of the RAM that are currently not being used.The recommended size of the swap space is depending on how much RAM you have.<...
View ArticleEncrypting Disks with LUKS in RHEL 6
IntroductionLUKS (Linux Unified Key Setup) is a standard for hard disk encryption. LUKS can encrypt both partition and LVM volumes. Here I will encrypt a partition.PrerequisiteCreata a new partition...
View ArticleManaging LVM with RHEL 6
IntroductionLVM (Logical Volume Manager) is a flexible way to handle disk space, since you can increase and decrease file systems, that is not possible to the same extent as in MBR (Master Boot Record)...
View ArticleUsing the Automounter Service on RHEL 6
RHEL 6 ships with a convenient network mounter service, the automounter.To check if the automounter is running.To use it, simply cd into the /net folder followed by nfs hostname.The remote network...
View ArticleManaging Network in RHEL 6
ToolsThe simplest way to manage network settings is to use the system-config-network tool or the non-graphical variant system-config-network-tuiTo start, stop, status all our network devicesOther...
View ArticleThe Medibuntu Project has come to an end
For many people the first thing they have done after installing Ubuntu, was to add the Medibuntu repository. But now it is dead. See announcement Here.But what is the impact? Not much. Ubuntu already...
View ArticleChanging Broadcom Driver In Ubuntu
I have a Broadcom Wireless Network Adapter and I had all sort of problem with the standard driver, Broadcom STA Wireless driver or wl that the module is called. To identify which Broadcom chipset you...
View ArticleJBoss Vault in JBoss EAP 6.2.0 uses jceks as Default KeyStore Type
Today I upgraded to JBoss EAP 6.2.0, but ran into some trouble with the keystore I have. I have one for the SSL connector and one for the JBoss Vault.To be able keep you old JBoss Vault keystore that...
View ArticleHardening RHEL5
The NSA has been getting a lot of attention in the media lately, but NSA has also published a lot of interesting document. A good example of that is theGuide to the Secure Configuration of Red Hat...
View ArticlePackt’s $5 eBook Bonanza is back!
Following on from the success of last year’s festive offer, the publisher will be celebrating the holiday season with an even bigger $5 Bonanza. From December 19th, customers will be able to get any...
View ArticleHardening RHEL 6
For Red Hat Enterprise Linux 6 hardening, look at http://benchmarks.cisecurity.org/downloads/show-single/?file=rhel6.120
View ArticleHardening Apache Web Server (httpd)
For hardening Apache Web Server, look athttp://benchmarks.cisecurity.org/downloads/browse/index.cfm?category=benchmarks.servers.web.apache
View Article