Managing devices in Linux  There are many interesting features of the Linux directory structure. This article covers some fascinating aspects of the /dev directory.  Device files are also known as device special files. Device files are employed to provide the operating system and users an interface to the devices that they represent. All Linux device files are located in the

Tuning for Zero Packet Loss in Red Hat OpenStack Platform For Telcos considering OpenStack, one of the major areas of focus can be around network performance. While the performance discussion may often begin with talk of throughput numbers expressed in Million-packets-per-second (Mpps) values across Gigabit-per-second (Gbps) hardware, it really is only the tip of the performance iceberg. The most common requirement is to have

Examining network connections on Linux systems | Network World Linux systems provide a lot of useful commands for reviewing network configuration and connections. Here’s a look at a few, including ifquery, ifup, ifdown and ifconfig. You might now most of them, but most propably not all of them… so check out to learn the rest.

Android users rejoice! Linux kernel LTS releases are now good for 6 years | Ars Technica The free and open source Linux kernel powers most of the devices around us. It’s not only present in computers and servers, in Android devices, the Internet of things, and almost anything else you can call “smart.” A major change in the maintenance lifecycle of Linux kernels is coming for good. During a Linaro

Security Tools to Check for Viruses and Malware on Linux | Wait, Linux needs antivirus and anti-malware solutions? I thought it was immune to such things. Perhaps a bit of clarification is necessary here. First and foremost, no operating system is 100 percent immune to attack.  Whether you need an antivirus or anti-malware scanner or a tool to hunt for rootkits, Linux has you covered.

Kali Linux 2017.2 Security OS Released With New Hacking Tools If you are a hacker, pentester, or a security researcher, this news should interest you. The best Linux OS, Kali Linux 2017.2  was released yesterday. Kali Linux is available for both 32-bit and 64-bit versions. The new Kali Linux distro version comes with more 20 new hacking tools.  Get the latest Kali 2017.2 from Kali download page.

Secure Your Raspberry Pi Against Attackers Raspberry Pi boards are fantastic for any project — they’re cheap, easy to use, can run a wide range of possible operating systems, and provide programmable GPIO pins as well as multi-core CPU availability and multiple USB ports. You can use Raspberry Pi boards for all kinds of automation and information gathering projects. But,

Top Linux distros for computer repair | There are specialized tools that can aid you in fixing problems with a computer or help you be prepared for when something bad does happen. Many of these tools are actually highly-specialized Linux distributions.  This article takes look at five different Linux distributions designed to make your life easier when computers start giving you

On link modeling, network emulation and its impacts on applications – RHD Blog In every packet-switched network, you will notice characteristics that are intrinsic to them and that varies depends on the communication channels being used. Such characteristics are bandwidth, delay (including jitter), packet loss, packet corruption and reordering. Linux has the tc queue discipline ‘netem’ for quite some time now. Netem is capable of emulating all

Playing with kernel TLS in Linux 4.13 and Go Linux 4.13 introduces support for nothing less than… TLS! The 1600 LoC patch allows userspace to pass the kernel the encryption keys for an established connection, making encryption happen transparently inside the kernel. The only ciphersuite supported is AES-128-GCM as per RFC 5288. The kernel only handles the record layer, that is, it only takes care