Search results for Using the 'snort' Intrusion Detection System
 |
|
Post date: April 12, 2005, 07:04
Category: Benchmarks
Views: 4367
Comments
|
Tutorial quote: It seems to be an exciting time for *nix operating systems, with a number of them recently releasing new versions that bring the addition of expanded features and claims of improved performance. If you're using GNU/Linux, OpenBSD, NetBSD, FreeBSD, or Solaris as a database server, you've probably recently considered an upgrade or switch to another OS in that list due to marketing hype and hearsay. This article will show you how to benchmark operating system performance using MySQL on these OSes so you can find out for yourself if you're missing out. While this may not necessarily be indicative of overall system performance or overall database application performance, it will tell you specifically how well MySQL performs on your platform.
The following operating systems were used for the comparison testing:
- FreeBSD 4.11
- FreeBSD 5.3
- NetBSD 2.0
- Linux 2.6
- Linux 2.4
- Solaris 10 x86 (build 69)
- OpenBSD 3.6 |
 |
|
Post date: November 9, 2008, 12:11
Category: Installing
Views: 5753
Comments
|
Tutorial quote: This tutorial provides step-by-step instructions on how to install Xen on a CentOS 5.2 system. Xen lets you create guest operating systems (*nix operating systems like Linux and FreeBSD), so called virtual machines or domUs, under a host operating system (dom0). Using Xen you can separate your applications into different virtual machines that are totally independent from each other (e.g. a virtual machine for a mail server, a virtual machine for a high-traffic web site, another virtual machine that serves your customers' web sites, a virtual machine for DNS, etc.), but still use the same hardware. This saves money, and what is even more important, it's more secure. If the virtual machine of your DNS server gets hacked, it has no effect on your other virtual machines. Plus, you can move virtual machines from one Xen server to the next one. |
 |
|
Post date: April 1, 2006, 05:04
Category: System
Views: 3449
Comments
|
Tutorial quote: This tutorial provides step-by-step instructions on how to install Xen (version 3.0.1) on a Debian Sarge (3.1) system.
Xen lets you create guest operating systems (*nix operating systems like Linux and FreeBSD), so called "virtual machines" or domUs, under a host operating system (dom0). Using Xen you can separate your applications into different virtual machines that are totally independent from each other (e.g. a virtual machine for a mail server, a virtual machine for a high-traffic web site, another virtual machine that serves your customers' web sites, a virtual machine for DNS, etc.), but still use the same hardware. This saves money, and what is even more important, it's more secure. If the virtual machine of your DNS server gets hacked, it has no effect on your other virtual machines. Plus, you can move virtual machines from one Xen server to the next one. |
 |
|
Post date: May 17, 2009, 13:05
Category: Miscellaneous
Views: 5656
Comments
|
Tutorial quote: This tutorial provides step-by-step instructions on how to install Xen (version 3.0.3) on a CentOS 5.3 (x86_64) system. Xen lets you create guest operating systems (*nix operating systems like Linux and FreeBSD), so called "virtual machines" or domUs, under a host operating system (dom0). Using Xen you can separate your applications into different virtual machines that are totally independent from each other (e.g. a virtual machine for a mail server, a virtual machine for a high-traffic web site, another virtual machine that serves your customers' web sites, a virtual machine for DNS, etc.), but still use the same hardware. This saves money, and what is even more important, it's more secure. If the virtual machine of your DNS server gets hacked, it has no effect on your other virtual machines. Plus, you can move virtual machines from one Xen server to the next one. |
 |
|
Post date: February 8, 2009, 13:02
Category: Installing
Views: 4063
Comments
|
Tutorial quote: This tutorial provides step-by-step instructions on how to install Xen on a Debian Lenny (5.0) system (AMD64). Xen lets you create guest operating systems (*nix operating systems like Linux and FreeBSD), so called "virtual machines" or domUs, under a host operating system (dom0). Using Xen you can separate your applications into different virtual machines that are totally independent from each other (e.g. a virtual machine for a mail server, a virtual machine for a high-traffic web site, another virtual machine that serves your customers' web sites, a virtual machine for DNS, etc.), but still use the same hardware. This saves money, and what is even more important, it's more secure. If the virtual machine of your DNS server gets hacked, it has no effect on your other virtual machines. Plus, you can move virtual machines from one Xen server to the next one. |
 |
|
Post date: June 7, 2006, 20:06
Category: Security
Views: 4216
Comments
|
Tutorial quote: Now, in my network (and others) the credentials provided at login could (and should) be used by those programs. How can you retrieve these credentials, providing enough security?
With a the PAM modules pam_script it's possible to store the password in a file, which will be used by fusemb and mount.cifs to read the password from.
To achieve security, one could make the user logging in owner and deny read/write for anybody else. Remove this file when the user ends his/her session.
This is enough, for runtime. But I was wondering, but what if the system crashes, and the file with the credentials remains on the harddrive? Anybody who is able to mount this harddrive with for example a lifecd, can read this file!
That's why I was looking for a way to encrypt this file.
With encfs this is very possible! At run time it gives an interface to encrypted files and directories, which does only exist at runtime! When the system is not running, there are only encrypted files, useless when you do not know the key to it. And this key is exactly the (encrypted) password! That's why I've chosen for a combination of PAM and Encfs. |
 |
|
Post date: March 31, 2011, 09:03
Category: Installing
Views: 3821
Comments
|
Tutorial quote: This tutorial provides step-by-step instructions on how to install Xen 4.0 on a Debian Squeeze (6.0) system (AMD64) and create paravirtualized guests. Xen lets you create guest operating systems (*nix operating systems like Linux and FreeBSD), so called "virtual machines" or domUs, under a host operating system (dom0). Using Xen you can separate your applications into different virtual machines that are totally independent from each other (e.g. a virtual machine for a mail server, a virtual machine for a high-traffic web site, another virtual machine that serves your customers' web sites, a virtual machine for DNS, etc.), but still use the same hardware. This saves money, and what is even more important, it's more secure. If the virtual machine of your DNS server gets hacked, it has no effect on your other virtual machines. Plus, you can move virtual machines from one Xen server to the next one. |
 |
|
Post date: April 14, 2005, 01:04
Category: Desktop
Views: 8475
Comments
|
Tutorial quote: There are many cursor themes available for the X11 Windowing System besides the default black pointer.
This guide will instruct you on where to get them, installing them, and configuring them. |
 |
|
Post date: April 12, 2005, 23:04
Category: System
Views: 3476
Comments
|
Tutorial quote: Identifying each stage of the boot process is invaluable in fixing boot problems and understanding the system as a whole. |
 |
|
Post date: April 14, 2005, 12:04
Category: Network
Views: 3139
Comments
|
Tutorial quote: Your users are complaining that "the Internet is, like, all slow." Users are always complaining, but you're seeing a lot of timeouts when you check mail, surf the Web, or try to log in for remote administration. Or even worse, latency is so bad that you keep getting killed all to heck in your favorite gory violent online multi-player game, so you know there is a problem. But there a lot of potential bottlenecks between your PC and the outside world, like your Internet gateway, proxy server, firewall, Internet service provider, and so forth, so where do you begin?
One of the best and most versatile network tools you can have is a notebook PC running Linux. This lets you plug in anywhere to run tests and find out what is going on. Make it a nothing-to-lose box--don't keep data on it so you can wipe and reinstall the operating system as necessary, because you want to be able to run tests outside of firewalls. Don't run any services. You can put a minimal iptables firewall on it, as there is no point in being totally exposed, but keep it simple. (Use MondoRescue to make a system snapshot for fast restores.) |
|
|