by Ramesh Natarajan
on December 8, 2008
Tripwire is a host based Intrusion detection system for Linux. Tripwire monitors Linux system to detect and report any unauthorized changes to the files and directories. Once a baseline is created, tripwire monitors and detects, which file is added, which file is changed, what is changed, who changed it, and when it was changed. If the changes are legitimate, you can update the tripwire database to accept these changes.
Also, for monitoring solution, please refer to all our previous articles on Nagios
This step by step instruction guide explains how to install and configure open source version of tripwire.
[continue reading…]
by Ramesh Natarajan
on December 4, 2008
Issue: You have tar, gzip and bzip2 working properly on your server. However, you are getting “CPAN.pm needs either the external programs tar, gzip and bzip2 installed. Can’t continue.” error message while installing a perl module using cpan. This article explains how to solve this problem.
Also, please refer to our previous article on How To Install Perl Modules using manual and cpan method.
[continue reading…]
by Ramesh Natarajan
on November 30, 2008
Around The Geek World is a monthly summary of interesting articles and news around the geek world with my brief comment.
by Ramesh Natarajan
on November 27, 2008
This is a guest post written by SathiyaMoorthy.
Wakeonlan (wol) enables you to switch ON remote servers without physically accessing it. Wakeonlan sends magic packets to wake-on-LAN enabled ethernet adapters and motherboards to switch on remote computers.
By mistake, when you shutdown a system instead of rebooting, you can use Wakeonlan to power on the server remotely. Also, If you have a server that don’t need to be up and running 24×7, you can turn off and turn on the server remotely anytime you want.
This article gives a brief overview of Wake-On-LAN and instructions to set up Wakeonlan feature.
[continue reading…]
by Ramesh Natarajan
on November 24, 2008
This is a guest post written by Eric Higgins.
We’ve come a long way since the very first instances of verbal and written communication. From the early stages of speech, along with the primitive use of symbols and pictures to convey messages to one another, we’ve evolved into a communications powerhouse. Data has never been transferred faster and communication has thus never been more sophisticated than it is right now.
[continue reading…]
by Ramesh Natarajan
on November 20, 2008
You can login to a remote Linux server without entering password in 3 simple steps using ssky-keygen and ssh-copy-id as explained in this article.
ssh-keygen creates the public and private keys. ssh-copy-id copies the local-host’s public key to the remote-host’s authorized_keys file. ssh-copy-id also assigns proper permission to the remote-host’s home, ~/.ssh, and ~/.ssh/authorized_keys.
This article also explains 3 minor annoyances of using ssh-copy-id and how to use ssh-copy-id along with ssh-agent.
[continue reading…]
by Ramesh Natarajan
on November 17, 2008
OMSA is a web based application to manage DELL PowerEdge Servers. Using OMSA you can perform proactive system monitoring, system diagnosis, troubleshoot hardware issues and configure RAID etc., You can also view and manage hardware’s embedded system management (ESM) log using OMSA.
This is an jumpstart guide that explains how to install Dell OMSA on Linux. I have also provided few screenshots of DELL OMSA web application.
[continue reading…]
by Ramesh Natarajan
on November 13, 2008
Starting from MySQL 5, when you execute show databases command, information_schema will be listed in the database list. information_schema is a virtual MySQL database that stores metadata information of all the MySQL databases.
Typically you will execute either DESCRIBE or SHOW commands to get the metadata information. However using the information_schema views, you can execute the standard select SQL command to get the metadata information. In this article, let us review few practical examples on how to use the information_schema database.
[continue reading…]