Containers can be considered the third wave in service provision after
physical boxes (the first wave) and virtual machines (the second
wave). Instead of working with complete servers
(hardware or virtual), you
have virtual operating systems, which are far more lightweight. more>>
In my last two articles, I looked at the Django Web application
framework, written in Python. Django’s documentation describes it as
an MTV framework, in which the acronym stands for model, template
Through the years, I have settled on maintaining my sensitive data in
files that I then encrypt asymmetrically. Although I take care to harden my
system and encrypt partitions with LUKS wherever possible, I want to secure my
most important data using higher-level tools, thereby lessening dependence on
the underlying system configuration. more>>
The target vehicle for this project is a vintage intercity transport bus (think
Greyhound) whose instrument panel was sparse and mostly nonfunctional.
The speedometer cable was twisted off some place back in 40 feet of
and the fuel sensor had sunk long ago. What I wanted was an instrument
panel more in line with modern practice.
The Raspberry Pi has been very popular among hobbyists and educators
ever since its launch in 2011. The Raspberry Pi is a credit-card-sized
single-board computer with a Broadcom BCM 2835 SoC, 256MB to 512MB of RAM,
USB ports, GPIO pins, Ethernet, HDMI out, camera header and an SD card
After years of making it clear that I’m not a developer in just
about every article I’ve written here at Linux Journal, I do have a
confession to make. I can write the “Hello World” equivalent in almost
every programming language out there. In assembly, it might have been
“1+1”, but my lack of advanced skills should be evident. more>>
Would you change what you said on the phone, if you knew someone malicious was listening?
Whether or not you view the NSA as malicious, I imagine that after reading the NSA coverage on
Linux Journal, some of you found yourselves modifying your behavior. The same thing
happened to me when I started deploying servers into a public cloud (EC2 in my case).
In my last article (February 2015), I explained how to create a simple
Django project (“atfproject”) and
inside that, create a simple application (atfapp). The
application worked in that if you went to the URL
you got the text “hello, Reuven”.
In last month’s issue, I talked about Linux permissions (see “It’s
Better to Ask Forgiveness…” in the May 2015 UpFront section).
I could have
covered SUID, GUID and sticky bit in the same article, but it seemed
like a lot to cover in one sitting. more>>
The first time I used vi was in a college programming course. It was the
default editor on the computer lab’s UNIX systems we used to compile our
assignments. I remember when our professor first introduced vi and
explained that you used the hjkl keys to move your cursor around instead of
the arrow keys. more>>
With Hiera, you can externalize your systems’ configuration data and
easily understand how those values are assigned to your servers. With
that data separated from your Puppet code, you then can encrypt sensitive
values, such as passwords and keys.
…than to understand Linux permissions! Honestly though, that’s
not really true. Linux permissions are simple and elegant, and once you
understand them, they’re easy to work with. Octal notation gets a little funky,
but even that makes sense once you understand why it exists.
Users and Groups:
Every linux adminsitrator knows this problem: You have a very, really very big file like a great MySQL dump and now you need to cut a small part from it, like the create table definition of one single table. It is quiet simple to find the line numbers that you want to cut from the […]