Manuel de sécurisation de Debian [ previous ] [ Contents ] [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ next ] Abstract This document describes security in the Debian project and in the Debian operating system. Copyright Notice Copyright © 2002-2013 Javier Fernández-Sanguino Peña Copyright © 2001 Alexander Reelsen, Javier Fernández-Sanguino Peña Copyright © 2000 Alexander Reelsen Some sections are copyright © their respective authors, for details please refer to Credits and thanks! Permission is granted to copy, distribute and/or modify this document under the terms of the GNU General Public License, Version 2 or any later version published by the Free Software Foundation. Permission is granted to make and distribute verbatim copies of this document provided the copyright notice and this permission notice are preserved on all copies. Contents Securing Debian Manual
Enterprise IT Monitoring for Networks, Applications, Virtual Servers & the Cloud We pride ourselves on delivering powerful, easy-to-use network monitoring software which gives you deep visibility into your entire network infrastructure – backed by fantastic customer service and all at a highly affordable price. Built for both service providers and enterprise customers, Opsview offers flexible pricing and deployment models that can easily be aligned to your business need. Whether you’re monitoring 50 devices or 20,000, Opsview gives you the deep visibility required to monitor the health and performance of your network and make informed decisions to prevent costly downtime. Get up and running in minutes with Opsview Core open source network monitoring software (free), or if you need to monitor more complex business environments choose Opsview Pro network monitor software (for SMEs) or Opsview Enterprise network monitoring tools (for deployments monitoring up to 20,000 devices). Try out Opsview Core now, our free, open source network monitoring application.
Install Wappalyzer Free to cheap(ish) shared storage Hi Guys, Sorry it's taken me a whole to post, enjoyed the user group, just wish there had been more time to chat to people at the break/end - maybe next time! My email address is in my profile I'm always happy to offer advice and share experiences if anyone wants to contact me. In the mean time here's a quick bit on some free, cheap, and not-so-cheap-but-still-not-expensive SAN options. Free: iSCSI Enterprise Target. Make sure you use version 0.4.15 or newer, it has VMware specific fixes relating to reserve/release, if you use an earlier version you will need to apply a 3rd party patch to your ESX host. You can find a guide on setting up IET here, it talks about doing it in a workstation 6 VM, but the proceedure is pretty much identical for a physical server. Cheap(ish): I use SANmelody as the storage for a production machine and have been very happy with it so far. Cheers,
Cloud Computing vs. Virtualization EmailShareEmailShare Like the article? Cloud computing and Virtualization are both technologies that were developed to maximize the use of computing resources while reducing the cost of those resources. They are also mentioned frequently when discussing high availability and redundancy. While it is not uncommon to hear people discuss them interchangeably; they are very different approaches to solving the problem of maximizing the use of available resources. They differ in many ways and that also leads to some important considerations when selecting between the two. Virtualization: More Servers on the Same Hardware It used to be that if you needed more computing power for an application, you had to purchase additional hardware. Enter virtualization. Most virtualization systems allow the virtual servers to be easily moved from one physical host to another. Cloud Computing: Measured Resources, Pay for What You Use Cloud computing grew out of the concept of utility computing.
RFC 4255: Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints Date de publication du RFC : Janvier 2006Auteur(s) du RFC : J. Schlyter (OpenSSH), W. Griffin (Sparta)Chemin des normesRéalisé dans le cadre du groupe de travail IETF secshPremière rédaction de cet article le 2 avril 2006Dernière mise à jour le 3 septembre 2007 On le sait, le protocole SSH dépend, pour la sécurité du client, d'une vérification de la clé publique du serveur, lors de la première connexion. Voici une session SSH typique, la première fois qu'on se connecte à foobar.example.org : % slogin foobar.example.org The authenticity of host 'foobar.example.org (172.19.1.33)' can't be established. Comme je ne m'étais jamais connecté depuis cette machine, la clé publique du serveur (dont l'empreinte, le résumé par une fonction de hachage cryptographique, est 38:e8:5b:...) n'était pas stockée (sur Unix, dans ~/.ssh/known_hosts). En théorie, je devrais vérifier (par téléphone, par échange d'empreintes signées avec PGP, etc) la clé publique du serveur. foobar.example.org.
oVirt DIFFMON - Monitor Uptime and Webpage Content Changes Data Storage Software V6 (DSS V6) The Open-E Data Storage Software V6 (DSS V6) is a unified file and block storage management operating system (OS) that provides Network Attached Storage (NAS), iSCSI, InfiniBand and Fibre Channel Storage Area Network (SAN) functionality. This product contains a one year free of charge BASIC Support. Open-E DSS V6 provides superior performance, security, and scalability at a fraction of the cost of alternative storage offerings. Advanced features of Open-E DSS V6 include Data and Volume Replication, Volume Snapshot, Automatic Failover for iSCSI Volumes, WORM and NDMP. Open-E DSS V6 includes NAS and iSCSI functionality and advanced features such as: Minimum Hardware Requirements: x86 - compatible PC2 GByte RAM (4 GByte RAM is recommended)CPU (1 GHz or faster are recommended)HDD (SATA, SAS, SCSI, ATA) / RAID / Fibre Channel / iSCSI StorageNetwork Interface Card (multi-cards 1Gb/s recommended for bonding)
Cloutage - Tracking Cloud Incidents, Security, and Outages