Linux Journal | November 2017 | Issue

Total Page:16

File Type:pdf, Size:1020Kb

Linux Journal | November 2017 | Issue ™ TIPS FOR USING THE HIGH-SECURITY Qubes Desktop NOVEMBER 2017 | ISSUE 283 Since 1994: The Original Magazine of the Linux Community http://www.linuxjournal.com Control a A LOOK AT ANSIBLE’S Heterogeneous ROLES Server Farm FEATURE with SSH Agent + Launching External Processes in Python Produce Readable Shell Scripts and Solve Deploy Equations WATCH: Instant Clusters ISSUE OVERVIEW in the Cloud V LJ283-Nov2017.indd 1 10/19/17 2:18 PM NEW! Deploying An Architect’s Kubernetes Guide: Linux with Security in the Age Practical books and Compliance of Containers in Mind Author: Author: Sol Lederman for the most technical Petros Koutoupis Sponsor: Sponsor: SUSE people on the planet. Twistlock SQL Server Managing on Linux Container Author: Security and Reuven M. Lerner Compliance GEEK GUIDES Sponsor: in Docker SUSE Author: Petros Koutoupis Sponsor: Twistlock Harnessing DevOps for the Power the Rest of Us of the Cloud Author: with SUSE John S. Tonello Author: Sponsor: Petros Koutoupis Puppet Sponsor: SUSE Download books for free with a An Memory: Past, simple one-time registration. Architect’s Present and Guide: Future—and Linux for the Tools to http://geekguide.linuxjournal.com Enterprise IT Optimize It Author: Author: Sol Lederman Petros Koutoupis Sponsor: Sponsor: SUSE Intel LJ283-Nov2017.indd 2 10/19/17 2:18 PM NEW! Deploying An Architect’s Kubernetes Guide: Linux with Security in the Age Practical books and Compliance of Containers in Mind Author: Author: Sol Lederman for the most technical Petros Koutoupis Sponsor: Sponsor: SUSE people on the planet. Twistlock SQL Server Managing on Linux Container Author: Security and Reuven M. Lerner Compliance GEEK GUIDES Sponsor: in Docker SUSE Author: Petros Koutoupis Sponsor: Twistlock Harnessing DevOps for the Power the Rest of Us of the Cloud Author: with SUSE John S. Tonello Author: Sponsor: Petros Koutoupis Puppet Sponsor: SUSE Download books for free with a An Memory: Past, simple one-time registration. Architect’s Present and Guide: Future—and Linux for the Tools to http://geekguide.linuxjournal.com Enterprise IT Optimize It Author: Author: Sol Lederman Petros Koutoupis Sponsor: Sponsor: SUSE Intel LJ283-Nov2017.indd 3 10/19/17 2:18 PM NOVEMBER 2017 CONTENTS ISSUE 283 FEATURES 78 Rapid, Secure 100 CLIC: CLuster Patching: Tools In the Cloud and Methods Automatically create and delete high-performance Control a heterogeneous server computing resources in farm with the SSH agent. the cloud. Charles Fisher Nathan R. Vance and William F. Polik 4 | November 2017 | http://www.linuxjournal.com Cover Image: © Can Stock Photo / scanrail LJ283-Nov2017.indd 4 10/19/17 2:18 PM CONTENTS COLUMNS 40 Reuven M. Lerner’s At the Forge Launching External Processes in Python 48 Dave Taylor’s Work the Shell A Number-Guessing Game 54 Kyle Rankin’s 23 Hack and / Lightning Hacks: Qubes Tips 58 Shawn Powers’ The Open-Source Classroom Ansible, Part IV: Putting It All Together 114 Doc Searls’ EOF New Hope for Digital Identity 36 IN EVERY ISSUE ON THE COVER 8 Current_Issue.tar.gz UÊ ÌÀÊ>ÊiÌiÀ}iiÕÃÊ-iÀÛiÀÊ>ÀÊÜÌ Ê--Ê}iÌ]Ê«°ÊÇn UÊ i«ÞÊÃÌ>ÌÊ ÕÃÌiÀÃÊÊÌ iÊ Õ`]Ê«°Ê£ää 10 Letters UÊ/«ÃÊvÀÊ1Ã}ÊÌ iÊ} -iVÕÀÌÞÊ+ÕLiÃÊ iÃÌ«]Ê«°Êx{ UÊÊÊ>ÌÊÃLi¿ÃÊ,iÃÊi>ÌÕÀi]Ê«°Êxn 18 UPFRONT UÊ>ÕV }Ê ÝÌiÀ>Ê*ÀViÃÃiÃÊÊ*ÞÌ ]Ê«°Ê{ä 38 Editors’ Choice UÊ*À`ÕViÊ,i>`>LiÊ- iÊ-VÀ«ÌÃÊ>`Ê-ÛiÊ µÕ>ÌÃ]Ê«°Ê{n 70 New Products 120 Advertisers Index LINUX JOURNAL (ISSN 1075-3583) is published monthly by Belltown Media, Inc., PO Box 980985, Houston, TX 77098 USA. Subscription rate is $29.50/year. Subscriptions start with the next issue. 5 | November 2017 | http://www.linuxjournal.com LJ283-Nov2017.indd 5 10/19/17 2:18 PM Executive Editor Jill Franklin [email protected] Senior Editor Doc Searls [email protected] Associate Editor Shawn Powers [email protected] Art Director Garrick Antikajian [email protected] Products Editor James Gray [email protected] Editor Emeritus Don Marti [email protected] Technical Editor Michael Baxter [email protected] Senior Columnist Reuven Lerner [email protected] Security Editor Mick Bauer [email protected] Hack Editor Kyle Rankin lj@greenfly.net Virtual Editor Bill Childers [email protected] Contributing Editors )BRAHIM (ADDAD s 2OBERT ,OVE s :ACK "ROWN s $AVE 0HILLIPS s -ARCO &IORETTI s ,UDOVIC -ARCOTTE 0AUL "ARRY s 0AUL -C+ENNEY s $AVE 4AYLOR s $IRK %LMENDORF s *USTIN 2YAN s !DAM -ONSEN President Carlie Fairchild [email protected] Publisher Mark Irgang [email protected] Associate Publisher John Grogan [email protected] Director of Digital Experience Katherine Druckman [email protected] Accountant Candy Beauchamp [email protected] Linux Journal is published by, and is a registered trade name of, Belltown Media, Inc. 0/ "OX (OUSTON 48 53! Editorial Advisory Panel Nick Baronian Kalyana Krishna Chadalavada "RIAN #ONNER s +EIR $AVIS -ICHAEL %AGER s 6ICTOR 'REGORIO $AVID ! ,ANE s 3TEVE -ARQUEZ $AVE -C!LLISTER s 4HOMAS 1UINLAN #HRIS $ 3TARK s 0ATRICK 3WARTZ Advertising % -!),: [email protected] 52,: www.linuxjournal.com/advertising 0(/.% EXT Subscriptions % -!),: [email protected] 52,: www.linuxjournal.com/subscribe -!), 0/ "OX (OUSTON 48 53! LINUX IS A REGISTERED TRADEMARK OF ,INUS 4ORVALDS LJ283-Nov2017.indd 6 10/19/17 2:18 PM Manage data expansion You with SUSE Enterprise cannot Storage. SUSE Enterprise Storage, the leading open source storage solution, is highly keep up scalable and resilient, enabling high-end functionality at a fraction of with data the cost. explosion. suse.com/storage Data LJ283-Nov2017.indd 7 10/19/17 2:18 PM Current_Issue.tar.gz Arrogance, the Biggest SHAWN Linux Security POWERS Shawn Powers is the Associate Editor for Linux Journal. He’s Problem also the Gadget Guy for LinuxJournal.com, and he has an INUX IS NO LONGER AN OBSCURE PLATFORM AVOIDED BY interesting collection those with malicious intent. It used to be that people of vintage Garfield with Windows 95 were the only ones getting viruses coffee mugs. Don’t L let his silly hairdo OR EXPERIENCING SECURITY VULNERABILITIES BUT THATS BEFORE fool you, he’s a Linux migrated to the cloud. Now, basically everything runs pretty ordinary guy ON ,INUX BOTH INSIDE AND OUTSIDE THE OFFICE DATA CENTER and can be reached via email at 4HAT MEANS NETWORK AND /3 SECURITY IS MORE IMPORTANT THAN [email protected]. EVER BEFORE AND NOW ,INUX USERS NEED TO BE ESPECIALLY Or, swing by the AWARE 4HE GOOD NEWS IS MOST ,INUX USERS KNOW SECURITY #linuxjournal IRC channel on is important and realize it’s a topic that needs to be Freenode.net. approached proactively. So this month, we look at some great ways to make our world a little more secure. /UR FEATURE ARTICLE IS BY #HARLES &ISHER AND HE EXPLAINS HOW V TO USE SIMPLE BUT SECURE METHODS FOR MAINTAINING MULTIPLE machines on your network using strong SSH keys and Parallel $ISTRIBUTED 3HELL !LTHOUGH CONFIGURATION MANAGEMENT VIDEO: Shawn AND SYSTEM ORCHESTRATION TOOLS ARE POWERFUL SOMETIMES ITS Powers runs IMPORTANT TO STRIP BACK ALL THE EXTRANEOUS FUNCTIONALITY AND through just execute remote commands on multiple computers over the latest issue. A SECURE CONNECTION #HARLES DESCRIBES HOW TO CONFIGURE YOUR CLIENTS AND PERFORM TASKS SECURELY OVER THE NETWORK 8 | November 2017 | http://www.linuxjournal.com LJ283-Nov2017.indd 8 10/19/17 2:18 PM Current_Issue.tar.gz I previously mentioned the cloud and how Linux is a vital part in almost all CLOUD BASED COMPUTING )N LIGHT OF THAT .ATHAN 2 6ANCE AND 7ILLIAM & 0OLIK DISCUSS HOW TO GO A STEP FURTHER AND NOT ONLY USE CLOUD COMPUTER INSTANCES BUT ALSO TO CREATE AN ENTIRE CLUSTER OF COMPUTERS IN THE CLOUD 7HEN SCALABILITY is instant, it means your cluster can grow and shrink as you need it, saving tons OF MONEY IN HARDWARE INVESTMENT AND RESOURCE MANAGEMENT 0LUS THE AUTHORS INCLUDE INFORMATION ON A HYBRID CLUSTER WHERE THE HEAD NODE IS ON LOCAL HARDWARE and the compute instances are spun up in the cloud only as needed. +YLE 2ANKIN WROTE A ,IGHTNING (ACKS ARTICLE THIS MONTH TO PROVIDE A HANDFUL OF REALLY GREAT IDEAS IN A REALLY SHORT AMOUNT OF TIME 4HIS TIME +YLES FOCUS IS ON 1UBES TIPS AND HOW HE DOES SOME PRETTY NIFTY THINGS WITH IT ON HIS SYSTEM !S WITH MOST OF +YLES WORK THESE TIPS CAN BE ADAPTED IF YOU DONT HAPPEN TO BE A 1UBES USER BUT REGARDLESS OF THE SYSTEM YOU USE ITS ALWAYS WORTHWHILE to read Kyle’s column! ) FINISH OFF MY SERIES ON !NSIBLE THIS MONTH WHICH IS ANOTHER TOOL YOU MAY OR MAY NOT BE USING (OPEFULLY AFTER FOLLOWING ALONG ON THIS FOUR PART SERIES YOUVE AT LEAST GIVEN !NSIBLE A TRY IN YOUR OWN NETWORK %VEN THE SMALLEST IMPLEMENTATION CAN SAVE HOURS OF WORK AND THE TIME REQUIRED TO GET STARTED IS MINIMAL 7E ALSO HAVE GREAT INFORMATION FOR CODERS AND DEVELOPING DEVELOPERS 2EUVEN - ,ERNER CONTINUES TEACHING ABOUT 0YTHON THIS MONTH WITH PARTICULAR FOCUS ON LAUNCHING EXTERNAL PROCESSES FROM INSIDE A 0YTHON SCRIPT 3OME TOOLS IN THE ,INUX SHELL ARE INVALUABLE AND OFTEN ITS NICE TO UTILIZE THEM INSIDE THE SCRIPT OF another language, like Python. $AVE 4AYLOR FOLLOWS 2EUVEN WITH HIS SHELL SCRIPTING COLUMN WHICH TEACHES ALL ABOUT THOSE CONVENIENT SHELL TOOLS 4HIS MONTH HE EXPLORES USING MATHEMATICAL evaluation tools in order to make a guessing game. Along the way, you’ll learn TO MAKE CLEAR READABLE CODE SO YOUR GUESSING GAME CAN BE THE FOUNDATION FOR more complicated and usable code. As usual, Dave teaches valuable skills while READERS GET TO PLAY COMMAND LINE GAMES We also have new products, reviews, tech tips and all the other goodies you’ve COME TO EXPECT MONTH AFTER MONTH FROM Linux Journal.
Recommended publications
  • Ein Wilder Ritt Distributionen
    09/2016 Besichtigungstour zu den skurrilsten Linux-Distributionen Titelthema Ein wilder Ritt Distributionen 28 Seit den frühen 90ern schießen die Linux-Distributionen wie Pilze aus dem Boden. Das Linux-Magazin blickt zurück auf ein paar besonders erstaunliche oder schräge Exemplare. Kristian Kißling www.linux-magazin.de © Antonio Oquias, 123RF Oquias, © Antonio Auch wenn die Syntax anderes vermu- samer Linux-Distributionen aufzustellen, Basis für Evil Entity denkt (Grün!), liegt ten lässt, steht der Name des klassischen denn in den zweieinhalb Jahrzehnten falsch. Tatsächlich basierte Evil Entity auf Linux-Tools »awk« nicht für Awkward kreuzte eine Menge von ihnen unseren Slackware und setzte auf einen eher düs- (zu Deutsch etwa „tolpatschig“), sondern Weg. Während einige davon noch putz- ter anmutenden Enlightenment-Desktop für die Namen seiner Autoren, nämlich munter in die Zukunft blicken, ist bei an- (Abbildung 3). Alfred Aho, Peter Weinberger und Brian deren nicht recht klar, welche Zielgruppe Als näher am Leben erwies sich der Fo- Kernighan. Kryptische Namen zu geben sie anpeilen oder ob sie überhaupt noch kus der Distribution, der auf dem Ab- sei eine lange etablierte Unix-Tradition, am Leben sind. spielen von Multimedia-Dateien lag – sie heißt es auf einer Seite des Debian-Wiki wollten doch nur Filme schauen. [1], die sich mit den Namen traditioneller Linux für Zombies Linux-Tools beschäftigt. Je kaputter, desto besser Denn, steht dort weiter, häufig halten Apropos untot: Die passende Linux- Entwickler die Namen ihrer Tools für Distribution für Zombies ließ sich recht Auch Void Linux [4], der Name steht selbsterklärend oder sie glauben, dass einfach ermitteln. Sie heißt Undead Linux je nach Übersetzung für „gleichgültig“ sie die User ohnehin nicht interessieren.
    [Show full text]
  • Introduction to Fmxlinux Delphi's Firemonkey For
    Introduction to FmxLinux Delphi’s FireMonkey for Linux Solution Jim McKeeth Embarcadero Technologies [email protected] Chief Developer Advocate & Engineer For quality purposes, all lines except the presenter are muted IT’S OK TO ASK QUESTIONS! Use the Q&A Panel on the Right This webinar is being recorded for future playback. Recordings will be available on Embarcadero’s YouTube channel Your Presenter: Jim McKeeth Embarcadero Technologies [email protected] | @JimMcKeeth Chief Developer Advocate & Engineer Agenda • Overview • Installation • Supported platforms • PAServer • SDK & Packages • Usage • UI Elements • Samples • Database Access FireDAC • Migrating from Windows VCL • midaconverter.com • 3rd Party Support • Broadway Web Why FMX on Linux? • Education - Save money on Windows licenses • Kiosk or Point of Sale - Single purpose computers with locked down user interfaces • Security - Linux offers more security options • IoT & Industrial Automation - Add user interfaces for integrated systems • Federal Government - Many govt systems require Linux support • Choice - Now you can, so might as well! Delphi for Linux History • 1999 Kylix: aka Delphi for Linux, introduced • It was a port of the IDE to Linux • Linux x86 32-bit compiler • Used the Trolltech QT widget library • 2002 Kylix 3 was the last update to Kylix • 2017 Delphi 10.2 “Tokyo” introduced Delphi for x86 64-bit Linux • IDE runs on Windows, cross compiles to Linux via the PAServer • Designed for server side development - no desktop widget GUI library • 2017 Eugene
    [Show full text]
  • Devops Interview Questions
    By OnlineInterviewQuestions.com Devops Interview Questions What is DevOps? DevOps is a one-stop solution for all software engineering. From creating the software to implementing it in real-time, DevOps does all. This creates an infinite demand for excellent DevOps developers in the market. Since the platform is quite fast and effective, it is attracting the attention of many organizations that are looking to develop a software solution for their own business. Thus, here are a few DevOps interview questions that can help you crack an interview in your dream organization and grow your career. Q1. What is DevOps ? DevOps is the term derived from Development and Operations. It is used in software engineering culture. It helps to perform the software operations and software developments. It provides a step-by-step process of software development. DevOps gives the clear process of software creation, testing, implementation and much more. It enhances the development frequency, makes short development cycle, and other for business activities. Q2. What are the advantages of DevOps ? There are various advantages that are offered by DevOps platform. The people gain many advantages with it. It reduces the risk of the problem and provides the possible solution in a simple way. It is more stable in the operating environments. It produces standard software delivery and adds value to the business. Q3. What are the anti-patterns of DevOps ? The pattern is the common practice followed by the organization. When others commonly adopt a pattern, it does not work for your business if you blindly follow it. Thus, it is necessary to look for anti-pattern.
    [Show full text]
  • Fujitsu and Red Hat's Integrated Solution to Enable Hybrid Cloud and Digital Transformation
    IDC Partner Spotlight Sponsored by: Red Hat Authors: Michael Ceroici Archana Venkatraman Fujitsu and Red Hat's Integrated Solution to Enable Hybrid Cloud and Digital Transformation January 2020 IDC Opinion Digital Transformation (DX) is crucial for survival in an age when customer experiences can make or break brands. Enterprises are executing on digital business initiatives to enhance customer insights, improve business processes or launch new services – all with an aim to improve customer satisfaction. DX strategy must be supported with a mature, agnostic, software-defined yet hardware-assisted and agile infrastructure. Such a future-ready architecture will not just make DX initiatives cost-effective and reliable, but also help enterprises limit the risks of proprietary lock-in and give them the flexibility to move data and applications as their business or governance needs demand. In our opinion, integrated systems, particularly with an open source ethos, can help enterprises to build a hybrid cloud and eliminate many complexities through a single support contract and a validated, unified infrastructure. Already, Linux and an accompanying stack of open source infrastructure software is emerging as the future of compute infrastructure, particularly for public cloud (growing at 13.9% CAGR to 2020). Most of the hyperscale datacenters or the largest public cloud infrastructure are built on a foundation of Linux. At the same time, paid Linux is steadily gaining a foothold in commercial accounts. Linux is becoming the de facto standard for a substantial portion — potentially the majority — of cloud native applications that will be built in the next decade. We believe that integrated, software-defined cloud solutions with mature open source integration will further grow in popularity as a foundation for DX.
    [Show full text]
  • Given the Pace of Development in Linux, It's Always
    BEST DISTRO Is your current Linux distribution really 2014 the best in town, or are you missing something even better? Graham, Ben and Mike put a bunch to the test. e’re going to get a lot of flak for writing pace of development in Linux, it’s always worth these words, but we’re not scared – Linux keeping your eyes open for something better. WVoice drops ice cubes down the vest of With all these things in mind, we decided to look at fear. So here we go: you might be using the wrong the current state of play in the Linux distro world. We Linux distribution. Or to put it more diplomatically, wanted to see which distros excel in certain you might not be running the distro that’s best suited important areas, to find out who’s leading the charge to you. “What a load of codswallop!”, you respond. here in mid-late 2014. “My distro does In tests like these, exactly what I need it it’s often possible to to do. I’ve been using “Given the pace of development in bundle certain distros it for years and I’m Linux, it’s always worth keeping an together as they’re so happy with it.” closely related. In the That’s great, but eye out for something better.” Packages section, for could it still do a lot instance, we look at more? Have you really tried all of the big-name Ubuntu and Mint together because they share the distros in depth? Could there be another distro out same repositories.
    [Show full text]
  • Opensuse 32 Bit Iso Download Opensuse 32 Bit Iso Download
    opensuse 32 bit iso download Opensuse 32 bit iso download. Completing the CAPTCHA proves you are a human and gives you temporary access to the web property. What can I do to prevent this in the future? If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware. If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices. Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the Chrome Web Store. Cloudflare Ray ID: 669f49e8e8a97b7f • Your IP : 188.246.226.140 • Performance & security by Cloudflare. Opensuse 32 bit iso download. Completing the CAPTCHA proves you are a human and gives you temporary access to the web property. What can I do to prevent this in the future? If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware. If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices. Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the Chrome Web Store. Cloudflare Ray ID: 669f49e96aadf14e • Your IP : 188.246.226.140 • Performance & security by Cloudflare.
    [Show full text]
  • Rudder 4.3 - User Manual I
    Rudder 4.3 - User Manual i Rudder 4.3 - User Manual Rudder 4.3 - User Manual ii Copyright © 2011-2016 Normation SAS Rudder User Documentation by Normation is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Permissions beyond the scope of this license may be available at normation.com. Rudder 4.3 - User Manual iii COLLABORATORS TITLE : Rudder 4.3 - User Manual ACTION NAME DATE SIGNATURE WRITTEN BY Jonathan Clarke, Jan 2018 Nicolas Charles, Fabrice Flore-Thebault, Matthieu Cerda, Nicolas Perron, Arthur Anglade, Vincent Membré, and François Armand REVISION HISTORY NUMBER DATE DESCRIPTION NAME 4.3 Jan 2018 N Rudder 4.3 - User Manual iv Contents 1 Online version 1 2 Introduction 2 2.1 What is Rudder? . .2 2.1.1 Made for production environments . .3 2.1.2 Different roles for a better accessibility . .4 2.1.3 Universality . .5 2.2 Key Features . .6 2.2.1 OS independent target configuration state definition . .6 2.2.2 Centralize and aggregate real configuration states . .7 2.2.3 Automatic inventory . .8 2.2.4 REST API . .8 2.2.5 Audit trace and Change Requests . .8 2.2.6 Centralized authentication (LDAP, Active Directory, plugins) . .9 2.2.7 Extensibilty . 10 2.3 Technical architecture and software dependencies . 11 2.3.1 Functional architecture of Rudder . 11 2.3.2 Network architecture in client/server mode . 12 2.3.3 Agents . 13 3 Installation 14 3.1 Quick installation . 14 3.2 Requirements . 15 3.2.1 Networking . 15 3.2.1.1 DNS - Name resolution .
    [Show full text]
  • Gestion Automatique Des Configurations Réseaux: Une
    THÈSE PRÉSENTÉE À L’UNIVERSITÉ DU QUÉBEC À CHICOUTIMI COMME EXIGENCE PARTIELLE DU DOCTORAT EN INFORMATIQUE PAR ÉRIC LUNAUD NGOUPÉ GESTION AUTOMATIQUE DES CONFIGURATIONS RÉSEAUX: UNE APPROCHE DÉDUCTIVE JUIN 2015 TABLE DES MATIÈRES Table des matières i Table des figures iii Liste des tableaux v Résumé 1 Introduction 3 1 La gestion des configurations 7 1.1 Évènements de l’actualité . 7 1.2 Les enjeux . 11 1.3 Qu’est-ce qu’une configuration ? . 14 1.4 Causes . 22 1.5 Conséquences des erreurs de configuration . 24 2 État de l’art en gestion des configurations 31 2.1 Approches actuelles dans la gestion des configurations réseau et de leur intégrité . 33 2.2 Protocoles de gestion . 40 2.3 La Gestion automatisée . 59 2.4 Outils de gestion automatisée de configuration . 61 2.5 Lacunes observées . 83 3 Modèle de configuration générique (Meta-CLI) 87 3.1 Gestion des dispositifs réseau . 88 3.2 Modèle formel de configurations de périphériques réseaux . 93 3.3 Mise en œuvre et expérimentation . 98 4 Comment optimiser la récupération de la configuration : Virtualisa- tion et évaluation Sélective 107 4.1 Vers une virtualisation sémantique des Configurations . 108 4.2 Exactitude de configuration d’un dispositif de réseau . 121 ii 4.3 évaluation sélective des contraintes de configuration . 124 4.4 Expérimentation . 135 Conclusion Générale 140 Annexes 144 Bibliographie 153 TABLE DES FIGURES 1.1 Fichier de configuration Version 11 de l’IOS Cisco . 17 1.2 Fichier de configuration d’OpenVPN . 20 1.3 Interface utilisant une adresse IP fixe . 21 1.4 Interface utilisant DHCP .
    [Show full text]
  • SKF Maintenance and Lubrication Products Extending the Bearing Life Cycle
    SKF Maintenance and Lubrication Products Extending the Bearing Life Cycle Dismounting Buy a bearing Basic condition Mounting monitoring Alignment Lubrication Mounting and dismounting Mechanical tools 10 Heating tools 40 Hydraulic tools 56 Instruments Alignment 80 Basic condition monitoring 100 Lubrication Lubricants 128 Automatic grease dispensing tools 158 Manual grease dispensing tools 172 Accessories 180 SKF Maintenance and Lubrication Products Oil inspection and dispensing 181 Our mission is to maximize our customer bearing Storage tools 184 performance through effective lubrication and Lubrication analysis tools 186 maintenance solutions. Lubrication software 188 The SKF Bearing Life Cycle Help your bearing achieve its maximum service life Every bearing has a certain service life potential. However, research has shown that, for various reasons, not every bearing achieves it. Important stages which have a major impact on a bearing service life can be recognised during the bearing’s lifecycle. These stages are mounting, lubrication, alignment, basic condition monitoring and dismounting. The stages in a bearing life cycle are extremely important for achieving the maximum service life of the bearing. By applying the right maintenance practices and using the correct tools, you can considerably extend your bearing’s service life and increase plant productivity and efficiency. Mounting Lubrication Includes mechanical fitting tools, Includes bearing greases, manual and induction heaters and hydraulic automatic lubricators and lubrication equipment accessories Mounting is one of the critical stages of the bearing’s lifecycle. If the Correct bearing lubrication is an essential step in reaching the bearing’s bearing is not mounted properly using the correct method and tools, the service lifetime.
    [Show full text]
  • AEP Complete Datasheet Documentation PROOF Q3 2019
    ADVANCED ENDPOINT PROTECTION DATASHEET PROVEN SUCCESS IN PREVENTING BREACHES ADVANCED ENDPOINT PROTECTION DATASHEET TABLE OF CONTENTS The Solution and The Results 3 Key Capabilities 4 Minimum Hardware Requirements 5 Windows Operating Systems Supported 6 Android Operating Systems Supported 6 iOS and macOS Operating Systems Supported 6 Contacting Support 7 About Comodo 8 PROVEN SUCCESS IN PREVENTING BREACHES ADVANCED ENDPOINT PROTECTION DATASHEET THE SOLUTION THE RESULTS 100% Trust Verdict of every unknown file Eliminate the damage from unknown threats Comodo Advanced Endpoint Protection (AEP) delivers Good files can be safely run. Bad files can be blocked. But how do you patent-pending auto-containment, where unknown executables deal with unknown files? If you run them and they’re bad, you’ve put and other files that request runtime privileges are automatically run your company at risk. If you block them and they’re legit, you prevent in a virtual container that does not have access to the host system’s users from doing their jobs. resources or user data. They run just as well as they would on the host system, making it seamless from the end-user perspective, but they cannot damage or infect the native system. Comodo AEP offers the broadest array of tools to identify known good and While running in auto-containment, unknown files are uploaded to a “ known bad files. For all the unknown, global threat cloud for real-time analysis, which returns a verdict our auto-containment technology and within 45 seconds for 95% of the files submitted. The remaining 5% verdict decision engine deliver a of cases are sent to researchers for human analysis who make a determination within SLA timelines.
    [Show full text]
  • Configuration Management How To
    HOW TO AUTOMATE CONFIGURATION MANAGEMENT ON AIX SYSTEMS ? CONFIGURATION MANAGEMENT FOR AIX AIX is and has always been very strong in virtualization and partitionning (LPAR, and then WPAR), offering a robust and stable plateform for critical services. Now that DevOps is gaining momentum, many tools are available to automate Linux and Windows systems, manage their configuration, orchestrate containers, etc. However, there are not that many tools to manage the AIX systems, even though there are often a lot of them to manage, given the ease of partitionning in AIX. Once a Logical or Workload Partition has been Among the few available tools to manage AIX, there is created, user accounts and permission have to be Chef, who release an AIX agent at the end of 2014, configured, network parameters are to be set and CFEngine, who always supported AIX, and (like DNS), system need to be configured Rudder, which suports AIX since mid-2014 (timezone, mountpoint, log centralization, monitoring, etc), and finally services need to be These tools deal with every aspect of the deploy. configuration management on AIX; with some These configurations not only need to be differences. Only Chef and Rudder offer a performed at initialisation, but maintained during comprehensive inventory of the system, Chef and all the life of the systems (users may come and CFEngine both need to code the configuration of the go, parameters may change, new version of the system, and only Rudder come with a Web interface services may be released, etc..) for configuration. To fully benefit from automation and manage all your systems alike, the choice of the right solution for your needs is important.
    [Show full text]
  • Virtualbox VM Setup
    VirtualBox VM setup If you have not used a VM before, the idea is that you will be running an entire operating system inside a program (VirtualBox) that looks to the virtual guest operating system like real hardware. We provide a downloadable image of the guest OS with everything installed, so that you only need to do minimal setup to get started. Note that since a VM contains a whole second operating system, the system requirements are high. The VM will take a bit over 512MB of ram (so you will probably want to have 2GB of total ram to keep Windows or Mac OS X running smoothly), plus a bit over 2GB of hard disk space. Getting VirtualBox • First, download Oracle's VirtualBox, either from the VirtualBox website at https://www.virtualbox.org/wiki/Downloads, or from Oracle's download page at http://www.oracle.com/technetwork/server-storage/virtualbox/downloads/index.html. Choose the version for the operating system you are running on your computer. • Once the download completes, run the installer to install VirtualBox. You will need administrator access on your computer to do so. Getting our VM image • Get our linux virtual machine image. • Unzip the file into a convenient directory. The unzipped files are about 2GB, so make sure you have enough disk space available. If you are a Windows XP user and have trouble opening the zip file, try WinZip (shareware) or 7-Zip (free, open source) instead of the built-in zip support in Windows. • Once you have unzipped the VM, double-click on the file "Compilers.vbox".
    [Show full text]