Tags » RedHat


Verificando la configuración

Para asegurar que el clúster ha sido correctamente  configurado, utilizamos las utilerías ubicadas en /usr/sbin

Probamos la accesibilidad a las particiones compartidas. 269 more words


VENOM - A Potentially Serious Virtual Machine Exploit

VENOM is a virtual machine bug which exploits the floppy disk controller used in some hypervisors and allows an attacker to break out of a guest O/S and escape into a host O/S. 181 more words

General DBA

Linux Distros

In response to a direct request, I will outline the Linux distros that I tolerate and why. Keep in mind that I think all operating systems suck, but some are more tolerable than others. 928 more words


How to recover FSTAB in Linux....

Out of the Box TIP :
If you loss your fstab entries for mounted drives and have no idea where is what so don’t panic just calm down take a deep breath.. 217 more words

Open Source OS

Google Summer of Code 2015 program with the Redhat JBoss Middleware Community!

Congratulations to the 1,051 students accepted for Google Summer of Code 2015! It must have been tough for the 137 mentoring organizations to choose from the huge number of applications received – 6,409 proposals from 4,425 students. 1,201 more words


Performance Tuning Tips for Linux OS when building a Hadoop cluster

Please keep in mind that these tips are general Linux OS tuning for Hadoop best practices and not exclusively for virtualization.

TIP #1:

Disable Swap/Paging… 330 more words


CVE-2015-0235 linux patch

Redhat has released a notification regarding security vulnerability  CVE-2015-0235 in the existing operating system versions. The vulnerability could be addressed by updating the glibc packages with nscd package from already created repository… 188 more words