iSCSI stands for Internet Small Computer System Interface. This works on TCP/IP layer and allows SCSI commands to be sent over local area networks (LAN). It is used to access the storage on your network over TCP/IP using block-level data transfers. There is often a comparison between NFS vs iSCSI. The key difference is NFS [...]
Linux
Chef is an IT infrastructure automation software, which can be used to manage all your servers and network equipments in your organization. You need a chef workstation when you want to interact with the chef server, or any physical nodes (servers, network equipments, etc) in your infrastructure. On a chef workstation, using several chef related [...]
Performing fsck on non-root filesystem is fairly straight forward. But, for root filesytem, you cannot perform fsck when it is mounted. This quick tutorial explains how to force filesytem check for a root filesystem. Root Filesystem In this example, /dev/sda1 partition is the root filesystem that is mounted as / # df -h Filesystem Size [...]
DROWN stands for Decrypting RSA with Obsolete and Weakened eNcryption. This is from Vulnerability Note VU#583776: Network traffic encrypted using RSA-based SSL certificates over SSLv2 may be decrypted by the DROWN attack. This is also referred as CVE-2016-0800. To fix the problem, you should simply disable support for SSLv2 on servers that are using RSA-based [...]
LUKS is the disk encryption for Linux. First time when you encrypt a partition with LUKS (or when you select encrypt disk option during OS installation), you have to specify a password that will be used when you open the LUKS partition. But, after that, you can mount and unmount the partition as many times [...]
CUPS stands for Common UNIX Printing System There are two ways to manage your printers on Linux environment: First, from command line, using lpadmin command, you can configure your printer and manage the print queues Second, from web UI, you can manage your printers interactively In one of our previous tutorial, we discussed about how [...]
Using docker, you can package your enterprise application into one self-contained container, which is guaranteed to run on any environment. This makes it easy for both developer and sysadmins to manage the application. If you are an administrator, you don’t have to hear this excuse from developer anymore: “But, it works on my dev environment!” [...]
LXC Containers are a very quick way to create a psuedo virtual environment. In the previous LXC article, we explained how to install and configure LXC linux containers. In this tutorial, we’ll explain how to create a new Linux container, start the container, and login to the LXC virtual console to use the new container. [...]