Utilizando 3 capas de autentificación en SSH

Nos mandan un artículo de como crear un metodo de autentificación de varias capas usando SSH y PAM para hacer mas seguros los accesos a nuestros sistemas

Security always requires a multi-layered scheme. SSH is a good example of this. Methods range from simple sshd configuration through the use of PAM to specify who can use SSH, to application of port-knocking techniques, or to hide the fact that SSH access even exists. Applying these techniques can make life much harder for possible intruders, who will have to go past three unusual barriers.

Introducción a esquemas de Fail-Over usando PowerHA

Nos mandan un artículo sobre como implementar esquemas de Fail-over en sistemas AIX. Independientemente del operativo que menciona, se me hace una buena referencia introductoria a esquemas de Fail-over para cualquier sistema operativo:

PowerHA for AIX is the new name for HACMP (High Availability Cluster Multiprocessing). HACMP is an application that makes system fault resilient and reduces downtime of applications. This article introduces PowerHA and provides a detailed explanation of how to configure a two node cluster. This document is very useful for understanding PowerHA and setting up a two node cluster.

Bazaar: Un poderoso control de versiones para desarrolladores

Nosn mandan un artículo introductorio a Bazaar, que es un sistema controlador de versiones tipo CVS, Subversion, GIT, etc.

Bazaar is used to produce the Ubuntu Linux distribution, which is an enormous software project with thousands of components. If you’re using a UNIX or Linux system, chances are that your distribution offers a pre-built Bazaar package. Bazaar is flexible enough to accommodate Subversion – a centralized system and Git – a decentralized system. This article introduces you to Bazaar‘s many appealing features.

Actualizaciones en vivo del Kernel usando Ksplice

Nos mandan un artículo de como parchar el Kernel de Unix sin tener que detener operación, o al menos el menor tiempo posible:

Ksplice applies kernel patches on-the-fly – no reboot required — in a fraction of a second. Here’s a hands-on guide to performing painless system updates. Learn how to patch a live kernel and give reboots the boot.

Capturando las interacciones de programas en Unix/Linux

Nos mandan un artículo de como capturar las salidas y entradas de programas en Unix/Linux

Modern UNIX systems provide a number of different tools to capture the text-oriented interaction between a user and a specific program and to capture graphical screens and single windows. This article focuses on different ways to keep a record of the interaction between a user and a command-line application.

Análisis de redes y protocolos en Unix

Nos mandan un artículo de como identificar protocolos y tráfico en la red para mejorar su rendimiento y vigilar su actividad…

Some UNIX protocols need investigation to understand what they are doing and what information they are exchanging. In this article, we will take a look at techniques for performing detailed analysis of the protocols in use on your UNIX network.

Consejos para usar variables ambientales y SSH

Nos mandan unos consejos para uso de variables ambientales y SSH en Unix:

You don’t have to break into a Watergate office to uncover the secrets of UNIX power users. There’s an informant, and he’s spilling the beans. Learn why Environment Variables, the dot file, and the Secure Shell (SSH) are very important.

Consejos y trucos para el uso de Emacs

Nos mandan una serie de ligas con algunos consejos y trucos para el uso de Emacs, que como escuche alguna vez: “Es el único ambiente operativo para programador que lo único que necesita es un buen editor de texto” … 😛

Master the rich features of the Emacs editor. It’s unlike any other program you’re likely to have encountered. Delve into the depths of its most advanced editing commands that have made it famous.

Unix cumple 40 años…¿Por qué sigue prosperando?

Nos manda la gente de IBM un breve recuento de la historia de Unix, con algo de tendencia hacia AIX (¿Por qué sera?)…

The systems world will shortly be celebrating a major anniversary milestone. UNIX is turning 40 years old! Most of us know the story of how UNIX was born, but what about why? Was it born strictly because its founders wanted to play a computer game on a different platform? And why does UNIX continue to thrive 15 years after an (in)famous Byte Magazine article that asked: Is UNIX dead?

Manejo de texto y filtrado en la línea de comando

Nos mandan un artículo introductorio al uso de utilerías para el filtrado de texto en la línea de comando de Unix/Linux:

There’s a lot more to text manipulation than cut and paste, particularly when you aren’t using a GUI. This article introduces you to text manipulation on Linux using filters from the GNU textutils package. By the end of this article, you will be manipulating text like an expert.