Subscribe
Tutorial search

Linux Vio Tutorials


Sort by:
Linux introspection and SystemTap
Linux introspection and SystemTap
Modern operating system kernels provide the means for introspection, the ability to peer dynamically within the kernel to understand its behaviors. With this knowledge, you can tune or modify the kernel to avoid failure conditions. Discover an open source infrastructure called SystemTap that provides this dynamic introspection for the Linux® kernel.
Difficulty:
Linux buffer overflow issues on Power-based systems
Linux buffer overflow issues on Power-based systems
Buffer overflows occur when a process tries to store data outside of the bounds of a fixed-length buffer. When that happens, all sorts of erratic system behavior can result. In this article, all examples of buffer overflow vulnerabilities in Linux running on Power/Cell Broadband Engine Architecture processor-based servers.
Difficulty:
Install and Configure Nagios to Administer a Networking System
Install and Configure Nagios to Administer a Networking System
Nagios is a very powerful platform because it is easy to extend. The previous chapters talked about check command plugins and how they can be used to check any host or service that your company might be using. Another great feature that Nagios offers is the ability for third-party software or other Nagios instances to report information on the status of services or hosts. This way, Nagios does not need to schedule and run checks by itself, but other applications can report information as it is available to them. This means that your applications can send problem reports directly to Nagios, instead of just logging them. In this way, your applications can benefi t from powerful notifi cation systems as well as dependency tracking. This mechanism can also be used to receive failure notifi cations from other services or machines—for example, SNMP (Simple Network Management Protocol) traps. This is described in more detail in Chapter 9. Nagios also offers a tool for sending passive check results for hosts and services over a network. It is called NSCA (Nagios Service Check Acceptor). It can be used to send results from one Nagios instance to another. It can also be used by third-party applications running on different machines to send passive check results to a central Nagios server. This mechanism includes password protection, along with encryption, to prevent injection of false results in to Nagios. In this way, NSCA communication sent over Internet is more secure.
Difficulty:
Access UniVerse and UniData using RedBack Objects with PHP and .Net
Access UniVerse and UniData using RedBack Objects with PHP and .Net
In this article, examine the history and essential framework of Web DE (previously RedBack), and learn how PHP and .NET can reference Web DE RedBack Objects (RBOs) to access U2 data stores in a similar way that ASP and Java technology can use them.
Difficulty:
backupios - how to backup an IBM VIO server
backupios - how to backup an IBM VIO server
backupios - how to backup an IBM VIO server
Difficulty:
Rational AppScan Standard Ed. V7.7 Trial
Rational AppScan Standard Ed. V7.7 Trial
Download a free trial of IBM Rational AppScan Standard Edition V7.7, previously known as Watchfire AppScan, a leading Web application security testing tool that automates vulnerability assessments and scans and tests for all common Web application vulnerabilities including SQL-injection, cross-site scripting and buffer overflow.
Difficulty:
Optimize your AIX 5L performance by tuning your network
Optimize your AIX 5L performance by tuning your network
This final part, Part 3, shows you how to monitor network packets The series also offers best practices for network I/O performance tuning. For the previous sections Part 1 and Part 2 and to learn more regarding how to optimize your AIX 5L.
Difficulty:
nanoHUB does remote computing right
nanoHUB does remote computing right
nanoHUB is a virtual computing center created to support nanotechnology research. It uses open source components to achieve far more powerful results than previous remote access facilities. This article details specific configurations and enhancements necessary to make the most of the performance, security, and usability such common software as VNC and WebDAV provides.
Difficulty:
Hide your folders in KDE
Hide your folders in KDE
Want to keep your MP3s away from your boss’ or big brother’s view? Of course, in Linux anything that starts with a period is “suppose” to be hidden; but all we have to do is type “ls -A” or turn on the viewing of hidden files in KDE…not too hard. Basically what we can do is set a transparent PNG as our folder icon, and rename our folder with a ” “(space). This will actually keep the previous name of the folder.Also we will keep anyone out of the folder that doesn’t know Linux commands, and doesn’t know exactly where we have placed the icon. This works GREAT for the desktop.
Difficulty:
Improve Your Memory Programming
Improve Your Memory Programming
Do you find yourself constantly being bogged down in programs that leak memory, violate memory bounds, use uninitialized data, and devote an excessive amount of run time to memory management? Use this article to help you conquer these pesky memory defects.
Difficulty:
DB2 version 9 meets Java business application
DB2 version 9 meets Java business application
It is possible to develop applications that employ both Java and PHP technology on AIX. In this article, learn how to connect the core application created in the second installment to a DB2 database for the storage of the survey questions and responses. Be sure to check out the two previous articles.
Difficulty:
Tune Your Memory with AIX 5L
Tune Your Memory with AIX 5L
Get an introduction to swap space, learn how to configure and administer it, capture statistics, and tune your Virtual Memory Manager settings to provide for optimum swap space configuration and performance. Check out the previous 2 articles.
Difficulty:
Customize your Emacs world
Customize your Emacs world
This tutorial walks you through some of the useful ways you can customize and configure the Emacs environment. Learn how to change everything about the Emacs environment to your liking, from the behavior of minor modes to the default key bindings.
Difficulty:
Search Term(s) (1): vio