Balu Wiki Documentation Release 0.42

Total Page:16

File Type:pdf, Size:1020Kb

Balu Wiki Documentation Release 0.42 BaLu Wiki Documentation Release 0.42 Balle & Lilu Mar 05, 2021 Contents 1 Arch Linux 1 2 Cgroups 3 3 Debian 7 4 Debugging 9 5 Fedora 11 6 Filesystem 13 7 Gnome3 15 8 Grub2 19 9 Inotify 23 10 IPMI 25 11 Kernel 29 12 LVM 33 13 Memory Management 35 14 OpenPandora 37 15 Redhat 41 16 Systemd 47 17 Xorg 55 18 OpenBSD 57 19 MacOS 71 20 Tools 77 i 21 Network 113 22 Security 141 23 Hacking 163 24 Cluster 173 25 Databases 241 26 Virtualization 263 27 Programming 279 28 Misc 349 29 Indices and tables 357 ii CHAPTER 1 Arch Linux 1.1 Install yaourt • Edit /etc/pacman.conf [archlinuxfr] Server= http://repo.archlinux.fr/$arch • Install yaourt pacman -Sy yaourt • Now you can install packages from aur.archlinux.org with yaourt -S <pkg> 1 BaLu Wiki Documentation, Release 0.42 2 Chapter 1. Arch Linux CHAPTER 2 Cgroups 2.1 Overview • Cgroups group processes so that you can define ressource limits and get stats for it • Processes are called tasks • Every process can only be in one cgroup • A cgroup can inherit the properties of another cgroup mkdir /cgroup/ mount -t cgroup -o memory nodev /cgroup/ 2.2 Installation yum install libcgroup 2.3 Create a new cgroup • Temporarily mkdir /cgroup/<groupname> • Or cgcreate -a <user> -g memory,cpu:<groupname> • Permanent by editing /etc/cgconfig.conf 3 BaLu Wiki Documentation, Release 0.42 group <name>{ [<permissions>] <controller>{ <param name>= <param value>; } } • e.g. mount{ cpuset= /cgroup/cpuset; cpu= /cgroup/cpu; cpuacct= /cgroup/cpuacct; memory= /cgroup/memory; devices= /cgroup/devices; freezer= /cgroup/freezer; net_cls= /cgroup/net_cls; blkio= /cgroup/blkio; } group students{ blkio{ blkio.throttle.read_bps_device= "1000"; blkio.throttle.write_bps_device= "1000"; } } • Dont forget to restart the cgconfig service in order to load the changes! service cgconfig restart 2.4 Map user and processes to a cgroup • Edit /etc/cgrules.conf <user> <subsystems> <cgroup> <user>:<command> <subsystems> <cgroup> • names with a prepending @ are groups 2.5 Manually starting a process in a cgroup cgexec -g <subsystems>:<cgroup> <command> <arguments> 2.6 Define limits • For memory memory.limit_in_bytes= 1000000 4 Chapter 2. Cgroups BaLu Wiki Documentation, Release 0.42 • Cpu time (default 1024 is 100% so 100 is ~10%) cpu.shares= 100 • CPU pinning cpuset.cpus=0-5,14,15 • Storage time (100% is value of 1024) blkio.weight= 512 2.6. Define limits 5 BaLu Wiki Documentation, Release 0.42 6 Chapter 2. Cgroups CHAPTER 3 Debian 3.1 Install with sysvinit as init system • On boot screen of install medium type tab and append preseed/late_command="in-target apt-get install -y sysvinit-core" 3.2 How to build a deb package • Unzip archive • cd source • dh_make -e [email protected] -f ../tar-file • choose single binary • Edit debian/control file • define dependency e.g. • libssl0.9.8 (>= 0.9.8~) • Enter description • Edit debian/rules override_dh_auto_configure: dh_auto_configure -- --prefix=/opt/myprogram • Move debian/init.d.ex to debian/myprogram.init and maybe edit it • dpkg-buildpackage -rfakeroot -b 7 BaLu Wiki Documentation, Release 0.42 3.3 Setting up a chroot environment debootstrap unstable /data/debian-tree 8 Chapter 3. Debian CHAPTER 4 Debugging 4.1 Create a core dump file ulimit -c unlimited 4.2 Read core dump file gdb /path/to/application /path/to/corefile 9 BaLu Wiki Documentation, Release 0.42 10 Chapter 4. Debugging CHAPTER 5 Fedora 5.1 Restart network systemctl restart NetworkManager.service 5.2 Allow SELinux exception • Click on selinux alert in bottom right corner • Click on Troubleshoot • Paste solution as root 5.3 Disable boot logo plymouth-set-default-theme details -R 5.4 Gnome3 settings • Install gnome-tweak-tool • Install gconf-editor 5.5 Change login background • Edit /usr/share/backgrounds/beefy-miracle/default/beefy-miracle.xml 11 BaLu Wiki Documentation, Release 0.42 5.6 Install flash plugin rpm -ivh http://linuxdownload.adobe.com/adobe-release/adobe-release-i386-1.0-1.noarch. ,!rpm rpm --import /etc/pki/rpm-gpg/RPM-GPG-KEY-adobe-linux yum check-update yum install flash-plugin nspluginwrapper alsa-plugins-pulseaudio libcurl 5.7 Upgrade system • http://fedoraproject.org/wiki/Upgrading_Fedora_using_yum 12 Chapter 5. Fedora CHAPTER 6 Filesystem 6.1 Show used inodes df -i 6.2 Dont reserve 5% space for system mke2fs -m0 6.3 Find out filesystem of unmounted device parted -l /dev/sda 6.4 SSD • Add the following options to fstab noatime,discard 13 BaLu Wiki Documentation, Release 0.42 14 Chapter 6. Filesystem CHAPTER 7 Gnome3 7.1 Configure startup applications • You can eithe use gnome-session-properties • or gnome-tweak-tool 7.2 Install a new theme • Goto www.gnome-look.org • Download a theme • Unzip it to ~/.themes • Install it with gnome-tweak-tool 7.3 Cool themes • http://gnome-look.org/content/show.php/Ambiance+Dark+Blue?content=169553 • http://gnome-look.org/content/show.php/E17gtk?content=163472 • http://gnome-look.org/content/show.php/Cenodark-red?content=165815 • http://gnome-look.org/content/show.php/Just-Dark?content=168025q 15 BaLu Wiki Documentation, Release 0.42 7.4 Automatically place windows • Enable Auto move windows extension • Add new placement rule 7.5 Non blank screensaver • killall gnome-screensaver • yum install xscreensaver • xscreensaver-demo 7.6 Changing keyboard shortcuts • Applications -> System Tools -> System Settings -> Keyboard 7.7 Default shortcuts • Alt+F1 - Switch between overview and desktop view • Alt+F2 - Launch command • Windows key - Goto activity view (enter first keys of what to execute / search) 7.8 Reload Gnome config • Alt+F2 r 7.9 Disable automount gsettings set org.gnome.desktop.media-handling automount false gsettings set org.gnome.desktop.media-handling automount-open false systemctl restart gdm.service 7.10 Install extensions • Goto extensions.gnome.org • Click on an extensions • Use the on/off button to install/deinstall extension 16 Chapter 7. Gnome3 BaLu Wiki Documentation, Release 0.42 7.11 Pidgin integration • Install https://extensions.gnome.org/extension/170/pidgin-peristent-notification/ • Or install https://extensions.gnome.org/extension/258/notifications-alert-on-user-menu/ 7.12 System monitor in top panel • Install https://extensions.gnome.org/extension/120/system-monitor/ 7.13 Declaring the primary monitor • Goto settings -> monitor • Use drag and drop to move the monitors around, the first is the primary 7.14 Configure desktop to be on all monitors • gnome-tweak-tool -> desktops 7.15 Remove window decorations • Assuming you use Adwaita as theme • Edit /usr/share/themes/Adwaita/metacity-1/metacity-theme-1.xml • Search for frame_geometry name=”normal” • Add has_title=”false” • Reload Gnome config 7.16 Alternative menu • To access the alternative menu hold the Alt key • This will for example allow you to hibernate instead of shutdown in the user menu 7.17 Switching back to old GNOME look and feel • Either set “Use Fallback Mode” in System Settings -> Details -> Graphics • Or install Mate http://mate-desktop.org/ 7.11. Pidgin integration 17 BaLu Wiki Documentation, Release 0.42 18 Chapter 7. Gnome3 CHAPTER 8 Grub2 8.1 Overview • Setting can be found in /etc/default/grub • Menu entries are located in /etc/grub.d/ as shell scripts (ordered by their number) • Do not directly edit /boot/grub/grub.cfg that the main config but its created from the above • To generate a basic config run grub-mkconfig -o /boot/grub/grub.cfg • To install grub into MBR grub-install /dev/sda 8.2 Global Kernel parameter • Edit /etc/default/grub parameter GRUB_CMDLINE_LINUX 8.3 Create a new Linux entry • Create a new script in /etc/grub.d e.g. 11_mylinux or edit 40_custom #!/bin/sh set -e menuentry "My Linux"{ set root=(hd0,1) (continues on next page) 19 BaLu Wiki Documentation, Release 0.42 (continued from previous page) linux /vmlinuz(add other options here as required) initrd /initrd.img( if the other kernel uses/needs one) } • Dont forget to make it executable! 8.4 Boot encrypted root with ramdisk menuentry "My Linux"{ set root=(hd0,1) linux /vmlinuz root=/dev/mapper/root cryptdevice=/dev/sda4:root initrd /initrd.img } 8.5 Boot encrypted root without ramdisk (untested) menuentry "My Linux"{ insmod gzio insmod part_gpt insmod cryptodisk insmod luks insmod gcry_twofish insmod gcry_sha256 cryptomount -u <uuid> insmod lvm insmod ext2 set root='lvm/vg-root' linux /vmlinuz root=/dev/mapper/vg-root } 8.6 Boot Windows • Create a new script in /etc/grub.d e.g. 99_windows #!/bin/sh menuentry "Windows XP"{ set root="(hd0,3)" chainloader +1 } 8.7 Boot only signed kernel and ramdisk • Generate gpg keypair 20 Chapter 8. Grub2 BaLu Wiki Documentation, Release 0.42 • Sign kernel gpg --detach-sign vmlinuz • Edit Grub config trust boot.key set check_signatures=enforce 8.8 Booting a rescue cd image menuentry "SYSRESCUECD"{ set iso=/systemrescuecd-x86-3.8.1.iso loopback loop ${iso} linux(loop)/isolinux/rescue64 nomodeset vga=791 docache setkmap=fr isoloop= ${iso} initrd(loop)/isolinux/initram.igz } 8.9 Convert grub1 menu.lst to grub2 config grub-menulst2cfg /boot/grub/menu.lst /boot/grub/grub.cfg 8.8. Booting a rescue cd image 21 BaLu Wiki Documentation, Release 0.42 22 Chapter 8. Grub2 CHAPTER 9 Inotify • React on file change events • Install incron • incrontab -e <directory> <file change mask> <command or action> options /var/www/html IN_CREATE /root/scripts/backup.sh /sales IN_DELETE /root/scripts/sync.sh /var/named/chroot/var/master IN_CREATE,IN_ATTRIB,IN_MODIFY /sbin/rndc reload /tmp IN_ALL_EVENTS logger"file $@ changed" 9.1 Recursive inotify • https://github.com/splitbrain/Watcher • http://www.splitbrain.org/blog/2011-01/07-watcher_a_recursive_incron_alternative [DEFAULT] logfile=/var/log/watcher.log pidfile=/var/run/watcher.pid [data] watch=/data events=create,delete,modify recursive=true autoadd=true command=rsync -a --delete $filename /media/backup 23 BaLu Wiki Documentation, Release 0.42 24 Chapter 9.
Recommended publications
  • Learn Python the Hard Way
    ptg11539604 LEARN PYTHON THE HARD WAY Third Edition ptg11539604 Zed Shaw’s Hard Way Series Visit informit.com/hardway for a complete list of available publications. ed Shaw’s Hard Way Series emphasizes instruction and making things as ptg11539604 Zthe best way to get started in many computer science topics. Each book in the series is designed around short, understandable exercises that take you through a course of instruction that creates working software. All exercises are thoroughly tested to verify they work with real students, thus increasing your chance of success. The accompanying video walks you through the code in each exercise. Zed adds a bit of humor and inside jokes to make you laugh while you’re learning. Make sure to connect with us! informit.com/socialconnect LEARN PYTHON THE HARD WAY A Very Simple Introduction to the Terrifyingly Beautiful World of Computers and Code Third Edition ptg11539604 Zed A. Shaw Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein.
    [Show full text]
  • CIS Debian Linux 7 Benchmark V1.0.0 - 12-31-2015
    CIS Debian Linux 7 Benchmark v1.0.0 - 12-31-2015 http://benchmarks.cisecurity.org The CIS Security Benchmarks division provides consensus-oriented information security products, services, tools, metrics, suggestions, and recommendations (the “SB Products”) as a public service to Internet users worldwide. Downloading or using SB Products in any way signifies and confirms your acceptance of and your binding agreement to these CIS Security Benchmarks Terms of Use. CIS SECURITY BENCHMARKS TERMS OF USE BOTH CIS SECURITY BENCHMARKS DIVISION MEMBERS AND NON-MEMBERS MAY: Download, install, and use each of the SB Products on a single computer, and/or Print one or more copies of any SB Product that is in a .txt, .pdf, .doc, .mcw, or .rtf format, but only if each such copy is printed in its entirety and is kept intact, including without limitation the text of these CIS Security Benchmarks Terms of Use. UNDER THE FOLLOWING TERMS AND CONDITIONS: SB Products Provided As Is. CIS is providing the SB Products “as is” and “as available” without: (1) any representations, warranties, or covenants of any kind whatsoever (including the absence of any warranty regarding: (a) the effect or lack of effect of any SB Product on the operation or the security of any network, system, software, hardware, or any component of any of them, and (b) the accuracy, utility, reliability, timeliness, or completeness of any SB Product); or (2) the responsibility to make or notify you of any corrections, updates, upgrades, or fixes. Intellectual Property and Rights Reserved. You are not acquiring any title or ownership rights in or to any SB Product, and full title and all ownership rights to the SB Products remain the exclusive property of CIS.
    [Show full text]
  • A Letter to the FCC [PDF]
    Before the FEDERAL COMMUNICATIONS COMMISSION Washington, DC 20554 In the Matter of ) ) Amendment of Part 0, 1, 2, 15 and 18 of the ) ET Docket No. 15­170 Commission’s Rules regarding Authorization ) Of Radio frequency Equipment ) ) Request for the Allowance of Optional ) RM­11673 Electronic Labeling for Wireless Devices ) Summary The rules laid out in ET Docket No. 15­170 should not go into effect as written. They would cause more harm than good and risk a significant overreach of the Commission’s authority. Specifically, the rules would limit the ability to upgrade or replace firmware in commercial, off­the­shelf home or small­business routers. This would damage the compliance, security, reliability and functionality of home and business networks. It would also restrict innovation and research into new networking technologies. We present an alternate proposal that better meets the goals of the FCC, not only ensuring the desired operation of the RF portion of a Wi­Fi router within the mandated parameters, but also assisting in the FCC’s broader goals of increasing consumer choice, fostering competition, protecting infrastructure, and increasing resiliency to communication disruptions. If the Commission does not intend to prohibit the upgrade or replacement of firmware in Wi­Fi ​ ​ devices, the undersigned would welcome a clear statement of that intent. Introduction We recommend the FCC pursue an alternative path to ensuring Radio Frequency (RF) compliance from Wi­Fi equipment. We understand there are significant concerns regarding existing users of the Wi­Fi ​ spectrum, and a desire to avoid uncontrolled change. However, we most strenuously advise against prohibiting changes to firmware of devices containing radio components, and furthermore advise against allowing non­updatable devices into the field.
    [Show full text]
  • Universidad Pol Facultad D Trabajo
    UNIVERSIDAD POLITÉCNICA DE MADRID FACULTAD DE INFORMÁTICA TRABAJO FINAL DE CARRERA ESTUDIO DEL PROTOCOLO XMPP DE MESAJERÍA ISTATÁEA, DE SUS ATECEDETES, Y DE SUS APLICACIOES CIVILES Y MILITARES Autor: José Carlos Díaz García Tutor: Rafael Martínez Olalla Madrid, Septiembre de 2008 2 A mis padres, Francisco y Pilar, que me empujaron siempre a terminar esta licenciatura y que tanto me han enseñado sobre la vida A mis abuelos (q.e.p.d.) A mi hijo icolás, que me ha dejado terminar este trabajo a pesar de robarle su tiempo de juego conmigo Y muy en especial, a Susana, mi fiel y leal compañera, y la luz que ilumina mi camino Agradecimientos En primer lugar, me gustaría agradecer a toda mi familia la comprensión y confianza que me han dado, una vez más, para poder concluir definitivamente esta etapa de mi vida. Sin su apoyo, no lo hubiera hecho. En segundo lugar, quiero agradecer a mis amigos Rafa y Carmen, su interés e insistencia para que llegara este momento. Por sus consejos y por su amistad, les debo mi gratitud. Por otra parte, quiero agradecer a mis compañeros asesores militares de Nextel Engineering sus explicaciones y sabios consejos, que sin duda han sido muy oportunos para escribir el capítulo cuarto de este trabajo. Del mismo modo, agradecer a Pepe Hevia, arquitecto de software de Alhambra Eidos, los buenos ratos compartidos alrrededor de nuestros viejos proyectos sobre XMPP y que encendieron prodigiosamente la mecha de este proyecto. A Jaime y a Bernardo, del Ministerio de Defensa, por haberme hecho descubrir las bondades de XMPP.
    [Show full text]
  • Download Windows Live Messenger for Linux Ubuntu
    Download windows live messenger for linux ubuntu But installing applications in Ubuntu that were originally made for I found emescene to be the best Msn Messenger for Ubuntu Linux so far. It really gives you the feel as if you are using Windows Live Messenger. Its builds are available for Archlinux, Debian, Ubuntu, Fedora, Mandriva and Windows. At first I found it quite difficult to use Pidgin Internet Messenger on Ubuntu Linux. Even though it allows signing into MSN, Yahoo! Messenger and Google Talk. While finding MSN Messenger for Linux / Ubuntu, I found different emesene is also available and could be downloaded and installed for. At first I found it quite difficult to use Pidgin Internet Messenger on Ubuntu Linux. Even though it allows signing into MSN, Yahoo! Messenger. A simple & beautiful app for Facebook Messenger. OS X, Windows & Linux By downloading Messenger for Desktop, you acknowledge that it is not an. An alternative MSN Messenger chat client for Linux. It allows Linux users to chat with friends who use MSN Messenger in Windows or Mac OS. The strength of. Windows Live Messenger is an instant messenger application that For more information on installing applications, see InstallingSoftware. sudo apt-get install chromium-browser. 2. After the installation is Windows Live Messenger running in LinuxMint / Ubuntu. You can close the. Linux / X LAN Messenger for Debian/Ubuntu LAN Messenger for Fedora/openSUSE Download LAN Messenger for Windows. Windows installer A MSN Messenger / Live Messenger client for Linux, aiming at integration with the KDE desktop Ubuntu: Ubuntu has KMess in its default repositories.
    [Show full text]
  • Github: a Case Study of Linux/BSD Perceptions from Microsoft's
    1 FLOSS != GitHub: A Case Study of Linux/BSD Perceptions from Microsoft’s Acquisition of GitHub Raula Gaikovina Kula∗, Hideki Hata∗, Kenichi Matsumoto∗ ∗Nara Institute of Science and Technology, Japan {raula-k, hata, matumoto}@is.naist.jp Abstract—In 2018, the software industry giants Microsoft made has had its share of disagreements with Microsoft [6], [7], a move into the Open Source world by completing the acquisition [8], [9], the only reported negative opinion of free software of mega Open Source platform, GitHub. This acquisition was not community has different attitudes towards GitHub is the idea without controversy, as it is well-known that the free software communities includes not only the ability to use software freely, of ‘forking’ so far, as it it is considered as a danger to FLOSS but also the libre nature in Open Source Software. In this study, development [10]. our aim is to explore these perceptions in FLOSS developers. We In this paper, we report on how external events such as conducted a survey that covered traditional FLOSS source Linux, acquisition of the open source platform by a closed source and BSD communities and received 246 developer responses. organization triggers a FLOSS developers such the Linux/ The results of the survey confirm that the free community did trigger some communities to move away from GitHub and raised BSD Free Software communities. discussions into free and open software on the GitHub platform. The study reminds us that although GitHub is influential and II. TARGET SUBJECTS AND SURVEY DESIGN trendy, it does not representative all FLOSS communities.
    [Show full text]
  • Ubuntu UNLEASHED 2012 Edition Covering 11.10 and 12.04
    Matthew Helmke with Andrew Hudson and Paul Hudson Ubuntu UNLEASHED 2012 Edition Covering 11.10 and 12.04 800 East 96th Street, Indianapolis, Indiana 46240 USA Ubuntu Unleashed 2012 Edition: Covering Ubuntu 11.10 and 12.04 Editor-in Chief Copyright © 2012 by Pearson Education, Inc. Mark Taub All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, Executive Editor or otherwise, without written permission from the publisher. No patent liability is Debra Williams assumed with respect to the use of the information contained herein. Although every Cauley precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions. Nor is any liability assumed for Senior Development damages resulting from the use of the information contained herein. Editor ISBN-13: 978-0-672-33578-5 Chris Zahn ISBN-10: 0-672-33578-6 Managing Editor Library of Congress Cataloging-in-Publication Data: Kristy Hart Helmke, Matthew. Ubuntu unleashed / Matthew Helmke. — 2012 ed. Project Editor p. cm. Andrew Beaster “Covering 11.10 and 12.04.” ISBN-13: 978-0-672-33578-5 (pbk. : alk. paper) Copy Editor ISBN-10: 0-672-33578-6 (pbk. : alk. paper) Keith Cline 1. Ubuntu (Electronic resource) 2. Linux. 3. Operating systems (Computers) I. Title. QA76.76.O63U36 2012 Indexer 005.4’32—dc23 Christine Karpeles 2011041953 Printed in the United States of America Proofreader First Printing: January 2012 Water Crest Trademarks Publishing All terms mentioned in this book that are known to be trademarks or service marks Technical Editors have been appropriately capitalized.
    [Show full text]
  • 24 Bringing Order to Chaos: Barrier-Enabled I/O Stack for Flash Storage
    Bringing Order to Chaos: Barrier-Enabled I/O Stack for Flash Storage YOUJIP WON and JOONTAEK OH, Hanyang University, Korea JAEMIN JUNG, Texas A&M University, USA GYEONGYEOL CHOI and SEONGBAE SON, Hanyang University, Korea JOOYOUNG HWANG and SANGYEUN CHO, Samsung Electronics, Korea This work is dedicated to eliminating the overhead required for guaranteeing the storage order in the modern IO stack. The existing block device adopts a prohibitively expensive approach in ensuring the storage order among write requests: interleaving the write requests with Transfer-and-Flush. For exploiting the cache bar- rier command for flash storage, we overhaul the IO scheduler, the dispatch module, and the filesystem sothat these layers are orchestrated to preserve the ordering condition imposed by the application with which the associated data blocks are made durable. The key ingredients of Barrier-Enabled IO stack are Epoch-based IO scheduling, Order-Preserving Dispatch,andDual-Mode Journaling. Barrier-enabled IO stack can control the storage order without Transfer-and-Flush overhead. We implement the barrier-enabled IO stack in server as well as in mobile platforms. SQLite performance increases by 270% and 75%, in server and in smartphone, respectively. In a server storage, BarrierFS brings as much as by 43× andby73× performance gain in MySQL and SQLite, respectively, against EXT4 via relaxing the durability of a transaction. CCS Concepts: • Software and its engineering → File systems management; Additional Key Words and Phrases: Filesystem, storage, block device, linux ACM Reference format: Youjip Won, Joontaek Oh, Jaemin Jung, Gyeongyeol Choi, Seongbae Son, Jooyoung Hwang, and Sangyeun Cho. 2018. Bringing Order to Chaos: Barrier-Enabled I/O Stack for Flash Storage.
    [Show full text]
  • Deploying Red Hat Openshift Container Platform 3.6 on Microsoft Azure
    Reference Architectures 2017 Deploying Red Hat OpenShift Container Platform 3.6 on Microsoft Azure Last Updated: 2018-01-12 Reference Architectures 2017 Deploying Red Hat OpenShift Container Platform 3.6 on Microsoft Azure Glenn West Ryan Cook Eduardo Minguez [email protected] Legal Notice Copyright © 2018 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent. Red Hat Software Collections is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
    [Show full text]
  • Ein Wilder Ritt Distributionen
    09/2016 Besichtigungstour zu den skurrilsten Linux-Distributionen Titelthema Ein wilder Ritt Distributionen 28 Seit den frühen 90ern schießen die Linux-Distributionen wie Pilze aus dem Boden. Das Linux-Magazin blickt zurück auf ein paar besonders erstaunliche oder schräge Exemplare. Kristian Kißling www.linux-magazin.de © Antonio Oquias, 123RF Oquias, © Antonio Auch wenn die Syntax anderes vermu- samer Linux-Distributionen aufzustellen, Basis für Evil Entity denkt (Grün!), liegt ten lässt, steht der Name des klassischen denn in den zweieinhalb Jahrzehnten falsch. Tatsächlich basierte Evil Entity auf Linux-Tools »awk« nicht für Awkward kreuzte eine Menge von ihnen unseren Slackware und setzte auf einen eher düs- (zu Deutsch etwa „tolpatschig“), sondern Weg. Während einige davon noch putz- ter anmutenden Enlightenment-Desktop für die Namen seiner Autoren, nämlich munter in die Zukunft blicken, ist bei an- (Abbildung 3). Alfred Aho, Peter Weinberger und Brian deren nicht recht klar, welche Zielgruppe Als näher am Leben erwies sich der Fo- Kernighan. Kryptische Namen zu geben sie anpeilen oder ob sie überhaupt noch kus der Distribution, der auf dem Ab- sei eine lange etablierte Unix-Tradition, am Leben sind. spielen von Multimedia-Dateien lag – sie heißt es auf einer Seite des Debian-Wiki wollten doch nur Filme schauen. [1], die sich mit den Namen traditioneller Linux für Zombies Linux-Tools beschäftigt. Je kaputter, desto besser Denn, steht dort weiter, häufig halten Apropos untot: Die passende Linux- Entwickler die Namen ihrer Tools für Distribution für Zombies ließ sich recht Auch Void Linux [4], der Name steht selbsterklärend oder sie glauben, dass einfach ermitteln. Sie heißt Undead Linux je nach Übersetzung für „gleichgültig“ sie die User ohnehin nicht interessieren.
    [Show full text]
  • 489 INDEX 1 10Kwizard, 194 123People.Com, 126, 135 a AAD, 373
    INDEX 1 A (cont.) 10kWizard, 194 Administrative Office of the U.S. 123People.com, 126, 135 Courts, 421, 432 Admissible Evidence, 31, 32, 119 A Internet Archive, 33 Social Networking Sites, 34 Wikipedia, 33 AAD, 373 Adobe, 69 AAJ, 298 Adobe Acrobat, 10, 71, See also ABA. See American Bar Association Adobe Reader, See also PDF ABI, 464 Adobe Reader, 71 Access Downloading, 10 GPO, 372 Toolbar, 72 Access to Archival Databases (AAD) Ads, 37 System, 373 Advanced Search, 69 ACCESSLAW Advertising California State Courts Ethics, 477 Free Case Law Database, 333 Law, 463, 464 Cases Agencies California Federal, 289, 418, 419 Free, 333 Directories, 408, 420 Accounting Forms, 472 TAXSites.com, 480 Statistics, 441 Accurint, 233, 244, 253 Local, 437 Bankruptcy, 196 State, 437 Canadian Phones, 255 Territorial (U.S.), 437 Contact Card Report, 255 Tribal (U.S.), 437 Deep Skip, 255 AGRICOLA Books, 373 Driver’s License Records, 126 AIPLA, 474 Driver’s Licenses, 255 Briefs, 477 E-mail database, 255 Air Force Personnel Foreclosure database, 257 Locator Services, 180 People Alert, 255 People at Work database, 255 Alerts Phones Plus, 255 Accurint, 255 Relavint, 255 Articles, 310 Vehicle Identification Numbers, 255 Blogs, 80 Voter’s Registration, 255 Cases, 304, 310, 327, 346 Address Bar, 6, 14, 35 Complaints, 462 Dockets, 453, 455, 461 Address Search, 233, 235, 245, 251, Dockets (Federal Courts), 453 253, 256, 262 EDGAR, 194 Past, 235 Federal Register, 409 Addresses Free, 80 E-mail, 144, 172, 215, 235 Google Scholar, 304, 310 Unlock, 144 Groups, 80 URL, 6, 26, 29, 117 Legal News, 284 Web Site, 2 Morningstar Document Research, 194 AdLawbyRequest.com, 464 News, 80 Patents, 310 489 A (cont.) A (cont.) Alerts (cont.) American Psychological Association Podcasts, 85 Citation Rules, 488 Scholar, 304, 310 SEC, 194 American Samoa Government U.S.
    [Show full text]
  • The Software Heritage Graph Dataset: Public Software Development Under One Roof
    The Software Heritage Graph Dataset: Public software development under one roof Antoine Pietri Diomidis Spinellisy Stefano Zacchiroli Inria Athens University of Economics and Business University Paris Diderot and Inria France Greece France [email protected] [email protected] [email protected] Abstract—Software Heritage is the largest existing public software licence analysis and license compliance [14], [15]. archive of software source code and accompanying development However, many research studies are still being conducted on history: it currently spans more than five billion unique source significantly smaller subsets of the entire corpus of publicly code files and one billion unique commits, coming from more than 80 million software projects. available source code artifacts. This paper introduces the Software Heritage graph dataset: a The Software Heritage project [16], [17] aims at fixing this fully-deduplicated Merkle DAG representation of the Software gap, by collecting, preserving, and sharing the entire body Heritage archive. The dataset links together file content iden- of publicly available software source code, together with the tifiers, source code directories, Version Control System (VCS) associated development history, as it is captured by modern commits tracking evolution over time, up to the full states of VCS repositories as observed by Software Heritage during periodic version control systems (VCS)[18]. crawls. The dataset’s contents come from major development In this paper we introduce the Software Heritage Graph forges (including GitHub and GitLab), FOSS distributions (e.g., Dataset, a graph representation of all the source code artifacts Debian), and language-specific package managers (e.g., PyPI). archived by Software Heritage. The graph is a fully dedu- Crawling information is also included, providing timestamps plicated Merkle DAG [19] that links together: source code about when and where all archived source code artifacts have been observed in the wild.
    [Show full text]