A quick overview of a compromised Linux system
Some time ago, a new customer approached us (thanks to a referral from Bytemark); they were using a virtual machine to host their website. The machine itself was RedHat 9 (from 2003ish) and was used to...
View ArticleSimple load checking shell script
Below is a simple shell script which can be used to control execution of tasks on a Linux system based on the systems current load value – with the intention that if the 5 minute load average is...
View ArticleGeary kickstarter
We and others have sponsored the “kickstarter” campaign for Geary (a new desktop email client for Linux). “Geary is a new email reader for GNOME designed to let you read your email quickly and...
View ArticleAnsible – System configuration management and orchestration
With the increasing prevalence of virtual machines, cloud servers and so on, performing systems administration is becoming more time consuming (more servers = more work!). One approach at solving this...
View ArticleStopping the deluge of email spam for qmail using SpamDyke
If you’re having spam trouble with qmail based Linux servers (in our customer’s case – Plesk based) then perhaps you need to look at using SpamDyke Installation is pretty easy – wget...
View Article
More Pages to Explore .....