Saturday 22 November 2014

Windows Is Now Completely Banned In China


By 2020, China aims to remove Windows OS completely and the country will have its own 'more' secure operating system by that time.

There will be no Windows operating system in China from now onwards as a complete wipe-out is in the pipeline very soon. It's obviously not going to happen overnight but over next few years Windows operating system will become non-existent in Chinese computers.

SoftPedia report claims that China has announced a complete ban on Windows OS as Microsoft is accused of spying on China government and businesses. Microsoft Windows OS is going to be replaced by Linux all across China. By 2020, China aims to remove Windows OS completely and the country will have their own more secure operating system by that time. Well, this ban has not been imposed only on the software section but in the hardware section too. Alternative solutions are sought to replace all servers and chips, based on Windows.

The country has declared Windows 8 as a spyware tool. All Chinese government computers are set to be replaced by NeoKylin, which is quite a good OS to be installed on Dell computers which are manufactured for the Chinese market. Windows computers in China are to be replaced at a rate of 15 per cent per year and the process is set to be completed in five years.

Friday 31 October 2014

How to install nagios server in Ubuntu 16.04 LTS

How to install server in Ubuntu 16.04 LTS. Nagios is one the robust and very good monitoring server which is highly used in corporate network either it is Small business Unit or big corporate.

Monday 23 June 2014

Top 9 Amazing Linux Distros for System Administrator

Being a part of the open source eco-system, Linux distros have had the advantage of regular upgrades something that is in an instant attention grabber. 

1.Debian
Debian is an operating system composed of free software mostly carrying the GNU General Public License. Debian systems can use either the Linux kernel (known as the Debian GNU/Linux distribution), the FreeBSD kernel (known as the Debian GNU/kFreeBSD distribution) or, more recently, the GNU Hurd kernel (more precisely, the GNU Mach microkernel and its servers; known as the Debian GNU/Hurd distribution). Debian GNU/Linux is one of the most popular Linux distributions for personal computers and network servers.

Target Users: System Administrators and Advanced users. 

2.Gentoo
Gentoo Linux is a computer operating system based on the Linux kernel and built using the Portage package management system. It is distributed as free and open source software. Gentoo package management is designed to be modular, portable, easy to maintain, and flexible.

Target Users: For those who already know their way in Linux

3.Ubuntu
Ubuntu is a Debian-based Linux operating system, with Unity as its default desktop environment (GNOME was the previous desktop environment). The Ubuntu project is publicly committed to the principles of open source development; people are encouraged to use free software, study how it works, improve upon it, and distribute it.

Target Users: Newbies

4.Red Hat Enterprise Linux
Red Hat Enterprise Linux (RHEL) is a Linux distribution developed by Red Hat and targeted toward the commercial market. Red Hat Enterprise Linux is released in server versions for x86, x86-64, Itanium, PowerPC and IBM System z, and desktop versions for x86 and x86-64. 

Target Users: System administrators

5.CentOS
CentOS is a Linux distribution that attempts to provide a free enterprise class computing platform which has 100 per cent binary compatibility with its upstream source, Red Hat Enterprise Linux (RHEL).

Target Users: Anyone who wants to test the working of server on Desktop

6.Fedora
Fedora is an operating system based on the Linux kernel, developed by the community-supported Fedora Project and owned by Red Hat. Fedora contains software distributed under a free and open source license and aims to be on the leading edge of such technologies.

Target Users: For those who want to taste bleeding-edge technology and can’t wait for the program to get stable

7.Kali Linux
Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. Kali Linux is preinstalled with numerous penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyser), John the Ripper (a password cracker), and Aircrack-ng (a software suite for penetration-testing wireless LANs).

Target Users: For penetration testers or ethical hackers

8.Arch Linux
Arch Linux is a Linux-based operating system for i686 and x86-64 computers. It is composed predominantly of free and open source software, and supports community involvement. The design approach of the development team focuses on elegance, code correctness, minimalism, and simplicity, and expects the user to be willing to make some effort to understand the system's operation.

Target Users: geeky distro

9.OpenSuse
openSUSE is a general purpose operating system built on top of the Linux kernel, developed by the community-supported openSUSE Project and sponsored by SUSE and a number of other companies. It comes in several editions for the x86 and x86-64 architectures.

Target Users: System Administrators

Saturday 21 June 2014

What is Wireless Network Security. Learn The Basics

Keep your wireless network safe from prying eyes at all times

Hackers are becoming more and more sophisticated each day and making use of some of the most thought-bred effective tools that guarantee complete attack and kill! While everyone can't be a tech-buff so as to know all about protecting yourself, there are some basics that you should know so you don't end up in trouble anytime soon.

Basic Terminology

1.Service Set Identifier (SSID)

Case sensitive, 32 alphanumeric character unique identifier attached to the header of packets sent over a wireless local-area network (WLAN) that acts as a password when a mobile device tries to connect to the basic service set (BSS); a component of the IEEE 802.11 WLAN architecture.

2.Wireless Access Point (WAP)
A wireless Access Point (AP) is a device that allows wireless devices to connect to a wired network using Wi-Fi, or related standards. The AP usually connects to a router (via a wired network) as a standalone device, but it can also be an integral component of the router itself.

3.Basic Service Set Identifier (BSSID)
A unique 48 bit key that forms the MAC address of WAP or wireless router.

4.Beacon frame
One of the management frames in IEEE 802.11 based WLANs that contains all the information about the network. Beacon frames are transmitted periodically to announce the presence of a Wireless LAN. Beacon frames are transmitted by the Access Point (AP) in an infrastructure BSS. In IBSS network beacon generation is distributed among the stations.

5.Wireless Equivalent Privacy (WEP)
An encryption scheme used to encrypt the WiFi data streams comprising of an encryption key and Initialisation Vector (IV). It uses a 64bit or 128bit key.

Securing Your Wireless Network


1.MAC filtering
MAC Filtering refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network. MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists.

2.Hiding SSID
Wireless devices can only connect to WAP via a known SSID. Therefore it's ideal you hide SSID. 

3.Encryption Keys
WEP is easily cracked within minutes even by the most mediocre of hackers out there. Those of you who were under the contention that WEP was really safe, well, think again! It is high time that you set your wireless routers up and change your wireless encryption from WEP to WPA2 security which is new and much stronger. 

4.Intrusion detection system
Intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. IDS come in a variety of “flavors” and approach the goal of detecting suspicious traffic in different ways.


Best Online Data Backup & Synchronization Tools

Hard disks and flash drives are passe. This is the era of the cloud. Make full use of it.

Hard disks and flash drives are passe. This is the era of the cloud. Make full use of it! 

We live in the era of cloud technology and big data to say the least is the increasing talk of the town. Backing up your crucial files online is the way to go today with both the average user as well as bigger organisations making full use of technology. Here are 10 online data backup and synchronisation tools for you. 

1.CX.com
The CX storage infrastructure is designed to run from any datacenter and storage environment. CX uses the Amazon Simple Storage Service (S3) due to its carefully engineered design that meets our requirements for scalability, durability, speed, low-cost, and simplicity.

2.MyPC Backup
MyPCBackup takes the security and privacy of your data very seriously. All your files are encrypted with the same security as banks use.

3.iDrive
Online backup for unlimited PCs, Macs, iPhones, iPads, Android devices and Facebook pictures into a single account.

4.CloudMe
CloudMe is a free and open service to store and make all your files available in the cloud through an easy to use Blue Folder.

5.SugarSync
SugarSync's cloud storage works in the background so your most important data is always backed up online and available to you รข€” regardless of your location or the computer you are using. 

6.Syncplicity
Syncplicity is an enterprise-grade online file sharing and mobile collaboration solution. Backed by EMC, it provides users with an experience they love and gives IT the security and control it needs.

7.Duplicati
Duplicati is a free backup client that securely stores encrypted, incremental, compressed backups on cloud storage services and remote file servers. 

8.BuddyBackup
BuddyBackup gives you unlimited online backups of your files for free, by allowing you to easily and securely backup your data onto your buddies.

9.CrashPlan
Only CrashPlan offers totally free local and offsite backup. A subscription to our cloud backup service gets you continuous backup, mobile file access and lots more. 

10.Comodo Backup
You can try 10 GB of highly secure, online storage which you can access from anywhere and sync between computers.



How to Dual-Booting With Windows 8 And Linux

Here are six ways to set up multi-booting with Windows 8 and Linux:

1. Install the Linux GRUB bootloader
-Install the Linux GRUB bootloader as the default boot object.

-The catch here is you need to have a UEFI-compatible Linux distribution (openSuSE, Fedora, Linux Mint and Ubuntu).

-When you install a UEFI-compatible Linux distribution and everything works well, you will get the GRUB boot menu after a reboot. You can then choose either Linux or Windows 8 to boot from it. 

2. Use the BIOS Boot Select Key
-There's a possibility that doing everything of the above still gets you nowhere, and you're still getting Windows rather than Linux after reboot.

-In that case you can use the BIOS Boot Selection option (activated by pressing a special key that varies between systems during the power-on or reboot process.) 

-Pressing the special key will interrupt the Windows boot process and you will get a list of available operating systems (Windows 8 and Linux).

3. Enable 'Legacy Boot'
-Some systems make it difficult to enable Legacy Boot. The option might be well hidden in the BIOS configuration, or require a BIOS password before they will let you change it. 

-Legacy Boot allows you to install more or less any Linux distribution, without worrying about UEFI compatbility.

4. Try a workaround
-There is a "next boot" option available, which specifices a one time boot configuration. 

-If it is set the system will try to boot that item first, and will also clear that setting so that on the next boot it goes back to using the default boot sequence list. 

-The next boot configuration can be set from Linux using efibootmgr -n XXXX, where XXXX is the item number from the boot list.

-Add the efibootmgr command to the Linux startup scripts. Every time you boot Linux, it would reset the value so that it would boot Linux again the following time.

5. Trick the default boot process
-Put the Linux shim.efi (or grubx64.efi) image where the Windows Boot Manager is normally located. This is a cleaver trick to trick the default boot process. 

6. Install a different Boot Manager 
-rEFInd has the advantage of being able to boot almost anything - Windows, Linux, MacOS. It automatically finds whatever might be on the disk and then presents you with a boot selection list. 

Source: ZDNet

Friday 20 June 2014

You Can Buy And Sell App Source Codes


Want to sell an app on Android or iOS? You don't always have to write your own source code

Here are 11 websites that will aid you in the transactions.

1. ChupaMobile
This is perhaps the top website for buying and selling of Android and iOS app source codes. It has a huge collection of games and apps and is very easy to navigate through. You can also sort the listings by frameworks.

2. Apptopia

This is amongst the best sources for buying completed apps. Moreover, you don't just purchase the source code, you purchase the entire app, which includes the intellectual property rights and others. 

3. CodeCanyon
If you have an Envato account then this website would be a good choice for you. They do not have a very huge collection yet, but being part of the Envato family makes payment processing etc. easier.

4. Bluecloud Solutions
This website is quite useful for anyone looking to start a business with the next app they buy. You of course do not want to buy something that's not up to the mark, so you will need to choose only the good ones. This website makes the choice for you and shows only the apps that have potential.

5. BinPress
This website hosts source code from open source projects on the internet, desktop PCs and for mobile devices. 

6. AppCoda
If you're looking to buy stuff only for iOS apps then this is the way to go. 

7. Sell My App
Although this website sells completed app source codes from the Android, iOS, BlackBerry and @ Windows apps, it is tilted towards iOS, with a bigger collection.

8. SellMyAppz.com
This website has a pretty large selection of apps for both Android and iOS operating systems.

9. CodeStore
Here you can purchase four types of app templates. These include comic book app template, a photo showcase app template, story book app template and coloring book app template.

10. AppSplit
This follows a practice similar to Ebay, but for app source codes. You have to bid on the app against others and the can win only if your bit is i

11. Sellfy
This is an ecommerce portal where you can setup your own shop and sell your apps, ebooks, software and other things.

10 Awesome Things You Can Do On Your Linux


Using Windows/Mac should not deter you from enjoying the finer things in life

Well, here are 10 such tricks only Linux can offer: 

1. Get malware free environment

-Rest assured your Linux-powered device will not be affected by viruses.

-Not every file found in the wild is executed in Linux.

-Does not allow auto-runs every time you plug a new disk.

2. Make upgrade without rebooting

-Every time you install software in Windows, it will ask you to reboot. However, with Linux you're saved the trouble!

3. You can also maintain the timestamp

-You can know when a file was last accessed with the help of 'touch' command.

-Prevents anyone from stealthily touching your files as it maintains a timestamp.

-Further, there is no limit in length for a filename.

4. You can search and install software easily

-Synaptic Package manager gives you access to most significant software packages from one source. Simply select your preference using drop down box to get the software that suits you best.

5. You can keep your system on for hundreds of hours and still have good processing speed

-Linux can clock several hours with multiple users using it and still runs at usual speed unlike Windows.

6. Move bootable drives between machines without re-installing them

-Each time you add RAM, Windows will always ask you to re-install. This is not the case with Linux.

7. Get software issues solved through forums

-If something goes wrong in Windows, you have to run to an expert to fix it. With Linux, you have discussion forums to help you achieve the same.

8. Get all your hardware supported

-Test all our hardware using live CD before installing the OS.

9. Choose your customised OS from hundreds of distributors

-Linux is just the engine and different operating systems are built around it. You can hand pick the one that suits your need.

10. Install Linux for “free” and keep your Windows

-You can install Linux in a separate drive and keep your Windows as well.

-Also you can run Windows applications on Linux platform using WINE.

Source: Silicon India

Monday 19 May 2014

Here Are The Top 8 Hacker Operating Systems

A complete hacker centric operating system, a dream come true for every ethical hacker out there.

 It's the era of ethical hacking as we speak. The fact that there are so many useful tools and resources available at your beck and call make hacking a sheer delight, and sometimes even a walk in the park. We have compiled here a list of 8 cool hacker centric operating systems you must give a try.


1.Bugtraq

Bugtraq is a distribution based on GNU/Linux aimed at digital forensics, penetration testing, Malware Laboratories, and GSM Forensics. This distribution has a huge range of penetration, forensic and laboratory tools. Bugtraq is available with XFCE, Gnome and KDE based on Ubuntu, Debian and OpenSuse. 

2.Parrot-sec Forensic OS

Parrot Security OS is an advanced operating system developed by Frozenbox Network and designed to perform security and penetration tests, do forensic analisys or act in anonimity. 

3.BackBox

BackBox is an Ubuntu-based Linux distribution penetration test and security assessment oriented providing a network and informatic systems analysis toolkit. BackBox desktop environment includes a minimal yet complete set of tools required for ethical hacking and security testing.

4.GnackTrack

GnackTrack is an open and free project to merge penetration testing tools and the linux Gnome desktop. It is a Live (and installable) Linux distribution designed for Penetration Testing and is based on Ubuntu.

5.DEFT

DEFT is a Live CD built on top of Xubuntu with tools for computer forensics and incident response. It's a very light and fast live system created for the Computer Forensics specialists.

6.NodeZero Linux

NodeZero Linux is reliable, stable, and powerful. Based on the industry leading Ubuntu linux distribution, NodeZero Linux takes all the stability and reliability that comes with Ubuntu’s Long Term Support model, and its power comes from the tools configured to live comfortably within the environment.

7.Pentoo

Pentoo is a security-focused livecd based on Gentoo. It's basically a gentoo install with lots of customised tools, customised kernel, and much more.

8.Kali Linux

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is preinstalled with numerous penetration-testing programs, including nmap, Wireshark, John the Ripper and Aircrack-ng. 

Wednesday 9 April 2014

Email Clients For Linux Users.



Email clients are applications that make it much easier to manage your email messages. Here are some open source options for email clients that are quite popular amongst Linux users.

1. Claws Mail
This is an email client that is based on GTK+ and features,

- Quick response
- Graceful, and sophisticated interface
- Easy configuration, intuitive operation
- Abundant features
- Extensibility
- Robustness and stability                                        



2. Thunderbird
Mozilla's free email application is perhaps the most popular amongst Linux users.

3. KMail
From the website: KMail is the email component of Kontact, the integrated personal information manager from KDE.

4. Balsa
Balsa is an e-mail client for GNOME, highly configurable and incorporating all the features you would expect in a robust mail client.

5. Sylpheed
This is a lightweight and easy-to-use email client that Linux users can try out.

6. Alpine
From the website: Alpine is a fast, easy to use email client that is suitable for both the inexperienced email user as well as for the most demanding of power users. Alpine is based on the Pine® Message System, which was also developed at the University of Washington. Alpine can be learned by exploration and the use of context-sensitive help. The user experience is highly customizable through the use of the Alpine Setup command.

7. Cone
From the website: Cone is a screen-oriented E-mail/News reader and writer. If you are reading this documentation from within Cone, you are actually reading the simplified HTML version of Cone's documentation that's formatted as a folder of E-mail messages. Each online tutorial chapter appears as a separate message. Use PgUp and PgDn to read each chapter. Press N and P to move to the next/previous chapter.

8. Pine
Pine stands for Program for Internet News and Email.

9. mutt
This is a text-based mail client that is based on the Unix operating system.

10. SquirrelMail
This is another email client that many Linux users love and use.


Wednesday 2 April 2014

Open Source Tools for Windows System Admin

As a System Admin for Windows, here are your gears of war Here are 10 admin tools that come in handy for the same.

1. Wireshark

This is a free software-based protocol analyser, which is a very useful tool for Windows administrators. Many say that it makes network traffic analysis easier by many degrees.

2. AMANDA


This is a Windows-based tool that stands for Advanced Maryland Automatic Network Disk Archiver. It allows the administrator to create a master backup server, which can support both Windows-powered servers and desktops.

3. MailArchiva


Email archiving is front and center in Exchange 2010, thanks to the increase in compliance regulation enforcement across the industry. But for those who are not yet using Exchange 2010, MailArchiva provides a worthwhile means for bringing compliance to Exchange 2000/2003 and other mail servers, such as Postfix, Sendmail, Qmail, iMail, and Lotus Notes.

4. Exchange 2010 RBAC Manager


Exchange 2010 RBAC Manager is a great tool for admins working with role-based access control and Exchange. RBAC Manager (aka RBAC Editor GUI) helps overcome the lack of a GUI tool to work with the new role-based administration side to Exchange, enabling admins to connect, whether or not you're a PowerShell master. The tool is written in C# and uses PowerShell behind the scenes to allow you to create and manage roles in your Exchange 2010 environment.

5. Core Configurator 2.0 for Server Core


This is a command-line tool for Windows Server 2002 and Windows Server 2008 R2. 

6. AutoSPInstaller for SharePoint 2010


This tool makes use of a number of different scripts in order to install SharePoint and implements database names that are untouched in all of this process.

7. OCS Inventory


This tool helps you to locate the devices that are connected to your network and hardware and software that has been installed on your computer. You have to instal the OCS client inventory agent on your systems.

8. UltraDefrag


This is a defragmentation tool for Windows-based computers. It is updated continuously to ensure improvements in the performance.

9. Nmap for Windows


Yes, this used to be a Linux-only platform at one point of time. But just like it was for Linux, Nmap for windows is a very useful and important security resource fr Windows computers.

10. Zenmap


This tool can be used for mapping a topology of devices that have been connected to your network. It works on Nmap and provides a graphical user interface for the comman-line tool.



Monday 31 March 2014

Tools For System And Network Admin


Are you a system administrator? If yes, then these tools will come in handy for you

System and Network Analysis: As an administrator, it is your job to monitor the system and network that you are presiding over. Analysis is an important part of being in the know of what's happening and when a particular action is required. That is where system and network analysis tools come in handy.

1. NTFS Permissions Explorer
2. Xirrus Wi-Fi Inspector
3. Whois
4. ShareEnum
5. PipeList
6. TcpView
7. The Dude
8. Microsoft Baseline Security Analyzer
9. WireShark
10. Look@LAN
11. RogueScanner
12. Capsa Free Network Analyzer
13. SuperScan
14. Blast
15. UDPFlood
16. IPplan
17. NetStumbler
18. PingPlotter
19. SolarWinds Free Permissions Analyzer for AD
20. Angry IP Scanner
21. FreePortMonitor
22. WirelessNetView
23. BluetoothView
24. Vision
25. Attacker
26. Total Network Monitor
27. IIS Logfile Analyser
28. ntop

System testing and troubleshooting: What's the next logical step after analysis your network? Of course, testing whether your analysis was right or wrong. To put it more clearly, as a system or network admin, it is one of your jobs to perform tests on your domain. These are the tools that let you do that.
29. Pinkie
30. VMWare Player
31. Oracle VirtualBox
32. ADInsight
33. Process Monitor
34. SpiceWorks Network Troubleshooting
35. RAMMap
36. Autoruns
37. LogFusion
38. Microsoft Log Parser
39. AppCrashView
40. RootKitRevealer

System and network management: These are tools that allow you to manage the network or system. In a way, they comprise of various tools that help an IT professional to manage a bunch of tasks or certain specific tasks.
41. Bitcricket IP Subnet Calculator
42. EMCO Remote Installer Starter
43. ManagePC
44. Pandora FMS
45. SNARE Audit and EventLog Management
46. OCS Inventory
47. Zenoss Core – Enterprise IT Monitoring
48. Unipress Free Help Desk
49. SysAidIT Free Help Desk
50. Cyberx Password Generator Pro

System and Network Management: These are tools that allow you to manage the network or system. In a way, they comprise of various tools that help an IT professional to manage a bunch of tasks or certain specific tasks.
51. KeePass Password Safe
52. TweakUAC
53. Microsoft Application Compatibility Toolkit
54. ExtraSpy Employee Monitor
55. NetWrix USB Blocker Freeware
56. FileZilla
57. Wake On Lan 2 .NET
58. Speccy
59. Active Directory Explorer (ADExplorer)
60. ADRestore

File and disk management: These are tools that allow you to perform various operations on your files. These include operations like de-duplication, copying, file comparison, merging, encryption, syncing, searching and renaming of files. These files can be invaluable additions to your arsenal as a system administrator.
61. Disk2vhd
62. Defraggler
63. PageDefrag
64. PsPad
65. MD5Summer
66. Universal Viewer
67. FreeCommander
68. Recuva
69. Steganos LockNote
70. Microsoft SyncToy
71. 7-Zip
72. PeaZip
73. Bacula
74. Areca Backup
75. DirSync Pro
76. Amanda Network Backup
77. WebSynchronizer
78. KGB Archiver
79. Iometer
80. Notepad++

Performance and availability monitoring: These tools allow you to monitor your system and network performance and monitor them for possible errors etc. They provide functions such as monitoring of memory utilisation, network utilisation, disk utilisation, CPU utilisation etc. In addition, you can also use the network monitoring tools in order to ensure that your network is performing at its optimal levels and is stable.
81. ManageEngine Free HyperV Performance Monitor
82. Nagios
83. ManageEngine Free Exchange Health Monitor
84. Kratos Exchange Monitor
85. ManageEngine Free Windows Health Monitor
86. ManageEngine Free Ping Tool
87. ManageEngine Free SQL Health Monitor Tool
88. ManageEngine Free VM Configuration Tool
89. Kratos Network Device Monitor
90. IxChariot QCheck
91. EasyNetMonitor

Remote management: As a system or network admin, you will be dealing with a lot of remote connections and clients. In order to manage this task efficiently, you need tools like the ones mentioned below. You can use them to remotely administer clients and servers, manage remote desktop sessions and various other functions.
92. Remote Desktop Manager
93. TightVNC
94. Microsoft RDCMan
95. Terminals
96. PsFile

All-in-one toolkits: Sometimes you do not want to use different tools for different purposes. You want tools that can manage multiple functionalities by themselves so that you don't have to switch over to a new one whenever your attention is needed in a new direction. These are all-in-one kits that fill up some of the gaps that exist in this respect.
97. Net Tools 5.0
98. ManageEngine Free Windows Tools 2
99. Axence NetTools Pro
100. Free IP Tools
101. PsTools

Open Source Backup Tools For Linux


There are different kinds of backup tools, which perform the same operating but in different ways and for different systems.
Experts have for a long time laid emphasis on backing up your system or network's data. The best way to ensure that you don't lose data is to use tools for creating backups.

Graphical User Interface (GUI): A graphical user interface always makes any task much easier than it would be otherwise. The same is applicable for tools that are used to backup your data in Linux.
1. Areca Backup
2. BackupPC
3. Bacula
4. fwbackups
5. Keep
6. Simple Backup Solution

Command-line: While GUIs do make the job easier, many Linux users still prefer to use the Command Line for as many tasks as possible. If you're such an user then these are the tools for you.
7. afbackup
8. AMANDA
9. Cedar Backup
10. Duplicity
11. Dump/restore
12. tar

Snapshot backups: In order to save time, some software create backups on a snapshot. This is a read-only copy of the data that can be used in order to restore lost information.
13. FlyBack
14. Time Vault

Thursday 20 March 2014

How To Find IP Conflicts In Linux

This tool sends ARP (Address Resolution Protocol) packets on local network to collect the addresses. If there is multiple MAC addresses claiming the same IP address, then there is conflict.
To install arp-scan on Ubuntu or Debian type:

To install arp-scan on Ubuntu or Debian type:
$ sudo apt-get install arp-scan
For Fedora, CentOS or Redhat:
$ sudo yum install arp-scan
To detect IP conflicts, run the following:
$ sudo arp-scan –I eth0 -l
An output example:
192.168.1.10   00:1b:a9:63:a2:4c       BROTHER INDUSTRIES, LTD.
192.168.1.30   00:1e:8f:58:ec:49       CANON INC.
192.168.1.33   00:25:4b:1b:10:20       Apple, Inc
192.168.1.37   10:9a:dd:55:d7:95       Apple Inc
192.168.1.38   20:c9:d0:27:8d:56       (Unknown)
192.168.1.39   d4:85:64:4d:35:be       Hewlett Packard
192.168.1.39   00:0b:46:e4:8e:6d       Cisco (DUP: 2)
192.168.1.40   90:2b:34:18:59:c0       (Unknown)
In this instance, the 19.168.1.39 IP is in conflict since it appears twice.

Friday 14 March 2014

Install Zabbix 2.2 (Network Monitoring Tool) on CentOS Redhat and Fedora

Zabbix is an open source software for networks and application monitoring. Zabbix provides agents to monitor remote hosts as well as Zabbix includes support for monitoring via SNMP, TCP and ICMP checks. Click here http://en.wikipedia.org/wiki/File:Zabbix.png to know more about zabbix.

Zabbix-Monitoring

This article will help you to step by step install Zabbix 2.2 Server on CentOS/RHEL 6/5 and Fedora Systems. Before starting installation read below basic requirements to run Zabbix 2.2.
  • Apache: 1.3.12 or later.
  • PHP: 5.3.0 or later.
  • MySQL: 5.03 or later.
  • OpenIPMI: Required for IPMI support.
  • libssh2: Required for SSH support. Version 1.0 or higher.
  • fping: Required for ICMP ping items.
  • libcurl: Required for web monitoring.
  • libiksemel: Required for Jabber support.
  • net-snmp: Required for SNMP support.

Step 1: Set Up Apache, MySQL and PHP

In order to use Zabbix we required a Web Server, database server and PHP to work. In this steps we are going to setup these services, You many skip this step if you have already configured it.
Install All Services
# yum install httpd httpd-devel 
# yum install mysql mysql-server 
# yum install php php-cli php-common php-devel php-pear php-gd php-mbstring php-mysql php-xml
Start All Services
# service httpd start
# service mysqld start
MySQL Initial Setup
Run following command to setup mysql initially and secure it
# mysql_secure_installation

Step 2: Configure Yum Repository

Before installing Zabbix first configure zabbixzone rpm repository in our system using following commands.
CentOS/RHEL 6:
# rpm -Uvh http://repo.zabbix.com/zabbix/2.2/rhel/6/x86_64/zabbix-release-2.2-1.el6.noarch.rpm

CentOS/RHEL 5:
# rpm -Uvh http://repo.zabbix.com/zabbix/2.2/rhel/5/x86_64/zabbix-release-2.2-1.el5.noarch.rpm

Step 3: Install Zabbix Server with MySQL

Use following command to install Zabbix using mysql database.
# yum install zabbix-server-mysql zabbix-web-mysql zabbix-agent zabbix-java-gateway

Step 4: Setup Zabbix Apache Configuration

Zabbix creates its own apache configuration file /etc/httpd/conf.d/zabbix.conf. Edit this file and just update timezone. More timezone’s
    php_value date.timezone Asia/Kolkata
After changing value restart Apache service.
# service httpd restart

Step 4: Create Zabbix MySQL Database

This installation is using mysql as backend of zabbix, So we need to create MySQL database and User for zabbixinstallation.
# mysql -u root -p

mysql> CREATE DATABASE zabbix CHARACTER SET UTF8;
mysql> GRANT ALL PRIVILEGES on zabbix.* to 'zabbix'@'localhost' IDENTIFIED BY 'SECRET_PASSWORD';
mysql> FLUSH PRIVILEGES;
mysql> quit
After creating database restore the default mysql database provided by zabbix. These files can be found at/usr/share/doc/zabbix-server-mysql-2.2.2/create/ directory.
# mysql -u zabbix -p zabbix < /usr/share/doc/zabbix-server-mysql-2.2.2/create/schema.sql
# mysql -u zabbix -p zabbix < /usr/share/doc/zabbix-server-mysql-2.2.2/create/images.sql
# mysql -u zabbix -p zabbix < /usr/share/doc/zabbix-server-mysql-2.2.2/create/data.sql

Step 5: Start Zabbix Server

After completing above setup, let’s start Zabbix server using following command.
# service zabbix-server start
After starting zabbix service, lets go to Zabbix web installer and finish the installation.

Step 5: Start Zabbix Web Installer

Zabbix web installer can be access using following url, Change FQDN as per you setup.
http://svr1.tecadmin.net/zabbix/setup.php

and follow the steps as per given screen shots below.
Zabbix Setup Welcome Screen
This is welcome screen of zabbix web installer. Go forward by click on next button.
zabbix-install-1
Check for pre-requisities
Check if your system have all required packages, if everything is ok click next.
zabbix-setup-2
Configure DB Connection
Enter database details created in Step #4 and click Test Connection. If database connection is correct, it will show ok message. After that click next.
zabbix-setup-3
Zabbix Server Details
zabbix-install-4
Pre-Installation Summary
This step will show the summary you have entered previous steps, so simply click next.
zabbix-install-5
Install Zabbix
zabbix-install-6
Zabbix Login Screen
Login to Zabbix using below default credentials.
   Username: admin
   Password: zabbix
zabbix-install-7