Archive for the ‘System Administration’ Category

Red Hat has, for quite some time discontinued PAE support in their kernels. For those who would like to use Red Hat Enterprise Linux 6, CentOS 6, or any derivatives – I’ve setup a repo here: http://arlgraphy.com/repos/ I’ll try to keep up with official releases but as with anything, I cannot guarantee compatibility. It’s provided [...]

Saturday, June 8th, 2013 at 18:07 0 comments

My friend Meethune was looking for a feature to simplify his google searches, he wrote: I was looking for a “select -> right click -> search google” feature for gnome-terminal. I didn’t find anything however I did find this little gem. Bind the following one liner to a keyboard shortcut in whatever window manager you [...]

Thursday, April 19th, 2012 at 14:51 1 comment

I was asked by an academic client to install Boinc Server on FreeBSD. BOINC is a software platform for volunteer computing and desktop Grid computing. FreeBSD has a boinc-client port, but not a port for the server, so it must be compiled manually. Following the instructions located on the Boinc wiki for a FreeBSD installation [...]

Friday, April 6th, 2012 at 11:38 0 comments

What is iSCSI? The SCSI protocol implemented over TCP/IP. It allows for iSCSI targets (servers) to export block/storage devices over the network to iSCSI initiators (client). For more technical details please checkout: http://en.wikipedia.org/wiki/ISCSI Some RFCs: http://www.ietf.org/rfc/rfc3720.txt http://tools.ietf.org/html/rfc3721 http://tools.ietf.org/html/rfc5048 What is gPXE? gPXE is an open-source bootloader that can run from the Pre-eXecution Environment (PXE) as [...]

Monday, April 2nd, 2012 at 21:18 8 comments

The solution to the age old problem of locking SFTP users into their home directory is setting up a chroot environment. This normally requires that you copy the necessary binaries and libraries so that your jailed users can make use of the allowed tools for file transfer. As of OpenSSH 4.9p1, things have gotten a [...]

Thursday, March 29th, 2012 at 20:23 0 comments

If you’re running a local mail client to send mail from your web application, you’ve probably already spent hours upon hours wondering why mail always ends up in the recipients spam/junk folder. No matter what combination of custom headers you pass to PHP’s mail function- yahoo, hotmail and maybe even gmail still marks it as [...]

Wednesday, January 18th, 2012 at 01:20 2 comments

In a previous post titled, “Home Wireless Router” I walked through my custom built FreeBSD, wireless router at home. In this post, we’ll add web based authentication for guests. Essentially, when an unknown users connects to our network and browses the web, we’ll display our own website with a note letting them know we’re watching. [...]

Friday, December 30th, 2011 at 21:57 0 comments

This isn’t going to be an AWK how-to, but an AWK-’why’. If you want a quick AWK tutorial check out Grymoires’ site. System Administrators, DevOps or whatever you want to call them these days often need to parse large amounts of data in log files in order to extract relevant data. In fact, this is [...]

Thursday, October 20th, 2011 at 10:27 0 comments

In my prior post I made the case against a rotating password policy and suggested two-factor authentication as a password policy that worked. Two-factor authentication requires both a password that is memorized and an item you have to verify that you are who you say you are. Two-factor authentication doesn’t have to be expensive. In [...]

Wednesday, October 5th, 2011 at 10:08 3 comments

Policies that require users to change their password every couple of months do nothing to increase security. Instead, these policies say quite a bit about the technical philosophy and capabilities of the company or administrator(s) in charge. They say, “I’m a point-and-click administrator” and “I don’t understand security.” I’ll try to make the case that [...]

Friday, September 30th, 2011 at 12:07 2 comments