Upgrade RAID1 to RAID5 without losing data
Initial considerations It is possible to upgrade RAID1 to RAID5 without losing data, but as any operation that involves stored data it is dangerous and may result in dataloss if not performed correctly, so be warned. Please be aware that this operation requires a Disk ARRAY of N-disk where N ≥ 3. The process to […]
Using OpenSSL to verify SSL/TLS connections
OpenSSL is a general-purpose cryptography library and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It’s licensed under the Apache License 2.0, meaning that you are free to get and use it for both commercial and non-commercial purposes, subject to a few simple license conditions. Using OpenSSL to check […]
PHP-FPM settings for best performance
A recurring question we get from customers is how to fine tune PHP-FPM settings. The official PHP documentation kind of lacks recommendations in this regard. So we’ve made this article explaining how you can calculate the optimal PHP-FPM settings for your server. PHP-FPM is an acronym for PHP FastCGI Process Manager, one of the most […]
Install docker & docker-compose on Oracle Linux
By default on the new Enterprise Linux distributions, docker engine has been replaced by podman, a docker compliant engine. In order to install docker and docker-compose, you can follow this simple tutorial. Install Docker Engine To install docker engine we’ll add first the docker repository: And now we can proceed to install docker: And we […]
How to mount a VHD disk image file
Sometimes you may need to mount a VHD disk image file in order to inspect its contents or even recover specific files. On Linux you can use the QEMU Disk Network Block Device Server utility – qemu-nbd – to access disk images in different formats as if they were block devices. First, you may want […]
How To Create a SSH Key
In this tutorial we will explain how you create a SSH Key pair and how to use this key to authenticate on remote devices. SSH, that stands for Secure Shell, is a network protocol used to establish an encrypted connection between two devices. The SSH protocol supports either the use of a username and password […]
NSA and FBI warn about national security threat due to new Linux malware
The United States the National Security Agency (NSA) and Federal Bureau of Investigation (FBI) have taken the unusual step of publishing a joint security alert containing details about a new strain of Linux malware that the agencies claim was developed and deployed in attacks by Russian military hackers. Through their joint alert, the two agencies […]
Lenovo ThinkPad will offer Linux pre-installed
According to an announcement published by Matthew Miller, Fedora Project Leader, on the popular website Fedora Magazine, new Lenovo ThinkPad laptops with Fedora Workstation pre-installed will be available in a near future. It is a pilot of Lenovo’s Linux Community Series – Fedora Edition, that begins with ThinkPad P1 Gen2, ThinkPad P53 and ThinkPad X1 […]
28 Antivirus products affected by symlink race bugs
According to a report published this week by security researchers from RACK911, “symlink race” vulnerabilities were found in 28 of today’s most popular antivirus software. RACK911 Labs reports how they came up with a simple method of using directory junctions (Windows) and symlinks (macOS & Linux) to exploit the most popular antivirus programs. A symlink […]
Faulty npm update crashes thousands of Linux Systems
npm, a widely well-known and vastly popular package manager for the JavaScript programming language, packed with the runtime environment Node.js, that includes a command-line client (npm), packed a critical bug on it’s latest npm v5.7.0 update. This bug was found and first reported on GitHub only three hours after the update was released. According to Jared […]