KVM stands for Kernel-based Virtual Machine.
As the name suggests, this is kernel based virtualization technology for Linux OS on hardware that supports virtualization.
The guest operating systems can be fully virtualized or para virtualized.
CVE-2014-6271 is a high impact critical fix. If you are running a Linux system, you should fix this vulnerability.
This CVE-2014-6271 (and CVE-2014-7169) vulnerability is also called as Shellshock.
A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.
In a typical scenario, during the boot process, the run-level system startup scripts are executed one-by-one.
A particular run level startup script will not execute until the previous script is executed completely. If a particular service during the startup is hanging for some reason, it might take a while before it times-out and move on to the next startup script.
Startpar utility is used to run multiple run-level scripts in parallel. This helps to speed up the boot process of your server.
To understand fuzzy logic, let us take a very simple example.
Imagine a simple light bulb which has two states: light on and light off.
We can mark the light off as false, and light on as true. This would be simple system that has two states and is described with George Boole’s logic. In his honor we have bool data type in C++.
Next, imagine that the simple light bulb could also be dimmed.
In the past few articles in the Python series, we’ve learned a lot about working with regular expressions in Python.
In this article, we’ll explain how we could use python regular expressions for a realistic task.
We’ll do a step by step walk through on how we can build Python data structures from formatted flat text files.
Apart from the default route, you can also configure additional routes.
For example, your server you might have 2 interfaces (eth0 and eth1). By default, all the traffic is routed through interface eth0 irrespective of what IP address you have configured on eth1.
To route the incoming and outgoing traffic through eth1, other than the default route (eth0), you also need to add additional routes for eth1 .
For Debian based systems like Ubuntu, you can use aptitude command for package management from the command line.
This article explains several aptitude command examples including the following:
- Install a specific version of a package
- Install multiple packages using pattern
- Search for a package using pattern
- Get packages under a section
- Don’t update a specific package (Using hold and keep)
- Mark a package with a specific install type
- Perform system update
- Perform safe upgrade
Most software products usually have a programmatic automation of input and output interface, which facilitate the monkey test.
With these interface, the product can be fully tested under various user input conditions.