by Balakrishnan Mariyappan
on November 12, 2014
pidstat stands for PID Statistics.
This tool can monitor an individual process that is managed by kernel and generate a report. It can monitor either a specific PID (process id), or all the process running on the system.
pidstat is a part of sysstat utility.
This tool reports various statistics including CPU used by a process, disk usage statistics of a process, statistics for threads associated with selected tasks and child processes.
[continue reading…]
by Luke P. Issac
on October 22, 2014
As we discussed earlier, using grunt, during your development process, you can execute tasks automatically in the background.
This is helpful in web and mobile UI development process where html, css and javascript are part of the tech stack.
This article covers this specific example scenario: Anytime you modify a css file in your development project, you would like grunt to automatically execute the minification routine on that css file.
[continue reading…]
by Karthikeyan Sadhasivam
on October 21, 2014
This article explains how to install SSL certificates on your ESXi machine & vCenter for browser compatibility.
First, on your Linux server, generate SSL certificate as explained below.
This will generate both private key and csr file. If you are generating certificate for multiple hosts, create separate directory for each host.
[continue reading…]
by Karthikeyan Sadhasivam
on October 20, 2014
KVM stands for Kernel-based Virtual Machine.
As the name suggests, this is kernel based virtualization technology for Linux OS on hardware that supports virtualization.
The guest operating systems can be fully virtualized or para virtualized.
[continue reading…]
by Ramesh Natarajan
on September 29, 2014
CVE-2014-6271 is a high impact critical fix. If you are running a Linux system, you should fix this vulnerability.
This CVE-2014-6271 (and CVE-2014-7169) vulnerability is also called as Shellshock.
A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.
[continue reading…]
by Karthikeyan Sadhasivam
on September 10, 2014
In a typical scenario, during the boot process, the run-level system startup scripts are executed one-by-one.
A particular run level startup script will not execute until the previous script is executed completely. If a particular service during the startup is hanging for some reason, it might take a while before it times-out and move on to the next startup script.
Startpar utility is used to run multiple run-level scripts in parallel. This helps to speed up the boot process of your server.
[continue reading…]
by Koscica Dusko
on September 4, 2014
To understand fuzzy logic, let us take a very simple example.
Imagine a simple light bulb which has two states: light on and light off.
We can mark the light off as false, and light on as true. This would be simple system that has two states and is described with George Boole’s logic. In his honor we have bool data type in C++.
Next, imagine that the simple light bulb could also be dimmed.
[continue reading…]
by Aaron Tabor
on August 25, 2014
In the past few articles in the Python series, we’ve learned a lot about working with regular expressions in Python.
In this article, we’ll explain how we could use python regular expressions for a realistic task.
We’ll do a step by step walk through on how we can build Python data structures from formatted flat text files.
[continue reading…]