Ibase’s Taiwan Excellence Award winners include two new railway computers

Ibase’s Taiwan Excellence Award winners include two new railway computers

Oct 24, 2018 — by Eric Brown

Ibase announced that its new Atom E3845 based “MPT-3000RP” — a EN50155-TX certified, IP67-protected railway PC — won a Taiwan Excellence Award along with a “DRD-037PC” railway signage PC and two recent Ibase embedded systems.

Ibase has won four 2019 Taiwan Excellence Awards, including one for a new MPT-3000RP railway computer, which is pictured at top and detailed farther below. The other winners include a yet to be announced, dual-screen DRD-037PC transportation computer and two systems that have recently been profiled on LinuxGizmos: the MAI602-M4D80 motion control computer and SI-324 signage player:

  • DRD-037PC — This ultra-wide, 21:6 ratio dual-screen transportation PC has yet to receive a spec list, but there’s a landing page linked to above. It likely runs on an Intel CPU and may well support Linux as well as Windows. The IP65 protected system meets EN50155 rolling stock equipment and EN45545-2 fire protection standards for railway applications. It features a screen on both sides to enables applications such as information and entertainment displays for railway platforms or for internally or externally mounted railway car displays. Features include an M.2 connector, multiple GbE ports, and “a wide viewing angle, high brightness and high resolution display,” says Ibase.

    DRD-037PC

  • MAI602-M4D80 — This rugged, Linux-supported motion control computer is designed for factory production applications, including machine vision systems. The system runs on Intel 6th or 7th Gen Core processors and integrates a PCIe card with 4-axis motion control and a camera. You also get 80-channel DIO and mini-PCIe expansion.

    MAI602-M4D80 (left) and SI-324
    (click images to enlarge)

     

  • SI-324 — This Ubuntu-ready signage PC runs on an AMD Ryzen Embedded V1000 SoC backed up by up to 32GB DDR4. The SI-324 provides four HDMI 2.0 ports for up to four simultaneous [email protected] displays or dual [email protected] displays. Other features include 2x GbE, 2x USB 3.0, mini-PC and M.2 expansion, and remote EDID management.

MPT-3000RP

Like the DRD-037PC, the MPT-3000RP is an EN50155 and EN45545 compliant transportation computer optimized for railway applications. However, instead of acting as a signage player, this is a more general-purpose computer designed to control a variety of onboard systems.

Protected from water and other ingress per IP67, the 270 x 210 x 63mm MPT-3000RP is equipped with a quad-core Intel Atom E3845 clocked at 1.91GHz. No OS support was listed.

MPT-3000RP front and side views
(click images to enlarge)

 

You can load up to 4GB DDR3L-1333 via dual slots, and store data with a CFast slot and a 2.5-inch SATA bay. In addition, one of the three M.2 sockets is designed for 2280-form factor SATA cards.

A second M.2 is designed for wireless 3042 cards, and a third M.2 slot is for a variety of 2230 cards (USB 2.0/PCIe). You also get half- and full-size mini-PCIe slots with USB 2.0 and USB 2.0/PCIe support, respectively. Dual SIM card slots and 4x antenna connectors are also available.

All the external interfaces use rugged M12 connectors. You get 2x GbE, 2x USB 2.0, and 3x serial ports, as well as single VGA, CAN, and wide-range voltage GPIO ports. There’s also an M12 connector for the “DC 9V~36V / 72V / 110V” input. Or as the announcement says, the system provides “interchangeable modular power supplies supporting a variety of inputs” and “full vehicle battery power control.”

The MPT-3000RP OS is wall-mountable and supports -40 to 70°C operation with an SSD. It also offers EN61373 compliant shock and vibration resistance. Other certifications include EN50153:2014, EN50121-3-2:2015, CE class A, and FCC class A.

Further information

No pricing or availability information was provided for the MPT-3000RP. More information may be found on Ibase’s MPT-3000RP product page (PDF).

Source

CloudLinux 7 and CloudLinux 6 Hybrid kernel updated

CloudLinux 7 and CloudLinux 6 Hybrid kernel updated

CloudLinux 7 and CloudLinux 6 Hybrid kernel version 3.10.0-714.10.2.lve1.5-19.8 is now available for download from our production repository.

Changelog:

  • KMODLVE-205: protected LVE cgroups from external removal to avoid kmodlve module crash;
  • KMODLVE-208: fixed the lvp tree lock deadlock which leads to kernel soft lockup and reboot;
  • KMODLVE-203: lvp global tree is now used to simplify ID management;
  • KMODLVE-206: fixed a typo in lvp Radix Tree initialization;
  • CLKRN-360: fixed NFS client deadlock on initialization.

To update a kernel, please use the following command.

CloudLinux 7:

yum install kernel-3.10.0-714.10.2.lve1.5.19.8.el7

CloudLinux 6 Hybrid:

yum install kernel-3.10.0-714.10.2.lve1.5.19.8.el6h

Source

8-Way Linux Distribution Benchmarks On The Intel Core i9 9900K – One Distro Wins 67% Of The Time

Following last week’s release of the Intel Core i9 9900K, I spent several days testing various Linux distributions on this latest Core i9 CPU paired with the new ASUS Z390-A PRIME motherboard. I was testing not only to see that all of the Linux distributions were playing fine with this latest and greatest desktop hardware but also how the performance was looking. Benchmarked this round on the i9-9900K was Ubuntu 18.04.1 LTS, Ubuntu 18.10, Clear Linux 25720, Debian Buster Testing, Manjaro 18.0-RC3, Fedora Workstation 29, openSUSE Tumbleweed, and CentOS 7.

The Intel Core i9 9900K as a reminder is the company’s first desktop 8-core CPU plus Hyper Threading. The 9900K has a base clock frequency of 3.6GHz but can clock up to 5.0GHz while having a 16MB L3 cache, dual channel DDR4-2666 support, UHD Graphics 630, and the entire processor fits within a 95 Watt power budget. The launch price on this new Core i9 9900K is $500 USD. See last week’s Core i9 9900K benchmark results for more information on how this CPU competes with the AMD Ryzen processors and compares to past Intel CPUs, even seeing how it compares to the old Core 990X.

The same system was used throughout the entire testing (obviously) and that consisted of the Intel Core i9 9900K at stock frequencies, ASUS PRIME Z390-A motherboard, 2 x 8GB DDR4-3200 Corsair memory, Samsung 970 EVO 250GB NVMe SSD, and a Radeon RX 580 graphics card.

All eight tested Linux distributions were run in their stock / out-of-the-box configuration. All of these Linux benchmarks on the Intel Core i9 9900K were run in a fully-automated and reproducible manner using the open-source Phoronix Test Suite benchmarking software.
Source

New security flaw impacts most Linux and BSD distros

Linux and BSD variants that employ the popular X.Org Server package –almost all do– are vulnerable to a new vulnerability disclosed on Thursday.

The vulnerability allows an attacker with limited access to a system, either via a terminal or SSH session, to elevate privileges and gain root access.

It can’t be used to break into secure computers, but it is still useful to attackers because it can quickly turn simple intrusions into bad hacks.

While the vulnerability is not in the redoubtable category of “as-bad-as-it-gets” flaws, the security flaw could not be ignored by the Linux and infosec communities once its existence was made public on Thursday.

The reason is because of the place it was found in –namely the X.Org Server package– a core graphics and windowing technology that is the base for the more famous KDE and GNOME desktop interface suites, and found in all major Linux and BSD distros that offer users a windows-based interface.

However, according to a report authored by security researcher Narendra Shinde, since May 2016, the X.Org Server package had contained a vulnerability that allowed attackers to either elevate privileges and/or overwrite any files on the local system, even crucial OS data.

The issue, tracked as CVE-2018-14665, was caused by improper handling of two command-line options, namely -logfile and -modulepath, which allowed an attacker to insert and execute their own malicious operations. The flaw was exploitable only when X.Org Server was configured to run with root privileges itself, which is a common setup for many distros.

X.Org Foundation developers released X.Org Server 1.20.3 to fix this issue. The fix disables support for these two command-line arguments if the X.Org Server package runs with root privileges.

Distros like Red Hat Enterprise Linux, Fedora, CentOS, Debian, Ubuntu, and OpenBSD have already been confirmed as impacted, and other smaller projects are most likely affected as well.

Security updates that contain the patched X.Org Server package are expected to roll out in the following hours and days.

Proof-of-concept code was also released earlier today by Matthew Hickey, Co-Founder and Director at Hacker House, a UK-based cyber-security firm.

“An attacker can literally take over impacted systems with 3 commands or less,” said Hickey on Twitter. “Lots of other ways to exploit e.g crontab. It’s hilarious on how trivial it is.”

Source

How to Install and Use FreeDOS on VirtualBox

This step-by-step guide shows you how to install FreeDOS on VirtualBox in Linux.

Installing FreeDOS on VirtualBox in Linux

In November of 2017, I interviewed Jim Hall about the history behind the FreeDOS project. Today, I’m going to tell you how to install and use FreeDOS. Please note: I will be using VirtualBox 5.2.14 on Solus.

Note: I used Solus as the host operating system for this tutorial because it is very easy to setup. One thing you should keep in mind is that Solus’ Software Center contains two versions of VirtualBox: virtualbox and virtualbox-current. Solus gives you the option to use the linux-lts kernel and the linux-current kernel. virtualboxis modified for linux-lts and virtualbox-current is for linux-current.

Step 1 – Create New Virtual Machine

Once you open VirtualBox, press the “New” button to create a new virtual machine. You can name it whatever you want, I just use “FreeDOS”. You can use the label to specify what version of FreeDOS you are installing. You also need to select the type and version of the operating system you will be installing. Select “Other” and “DOS”.

Step 2 – Select Memory Size

The next dialog box will ask you how much of the host computer’s memory you want to make available to FreeDOS. The default is 32MB. Don’t change it. Back in the day, this would be a huge amount of RAM for a DOS machine. If you need to, you can increase it later by right-clicking on the virtual machine you created for FreeDOS and selecting Settings -> System.

Step 3 – Create Virtual Hard Disk

Next, you will be asked to create a virtual hard drive where FreeDOS and its files will be stored. Since you haven’t created one yet, just click “Create”.

The next dialog box will ask you what hard disk file type you want to use. This default (VirtualBox Disk Image) works just fine. Click “Next”.

The next question you will encounter is how you want the virtual disk to act. Do you want it to start small and gradually grow to its full size as you create files and install programs? Then choose dynamically allocated. If you prefer that the virtual hard drive (vhd) is created at full size, then choose fixed size. Dynamically allocated is nice if you don’t plan to use the whole vhd or if you don’t have very much free space on your hard drive. (Keep in mind that while the size of a dynamically allocated vhd increases as you add files, it will not drop when you remove files.) I prefer dynamically allocated, but you can choose the option that serves your needs best and click “Next”.

Now, you can choose the size and location of the vhd. 500 MB should be plenty of space. Remember most of the programs you will be using will be text-based, thus fairly small. Once you make your adjustments, click Create,

Step 4 – Attach .iso file

Before we continue, you will need to download the FreeDOS .iso file. You will need to choose the CDROM “standard” installer.

Once the file has been downloaded, return to VirtualBox. Select your virtual machine and open the settings. You can do this by either right-clicking on the virtual machine and selecting “Settings” or highlight the virtual machine and click the “Settings” button.

Now, click the “Storage” tab. Under “Storage Devices”, select the CD icon. (It should say “Empty” next to it.) In the “Attributes” panel on the right, click on the CD icon and select the location of the .iso file you just downloaded.

Note: Typically, after you install an operating system on VirtualBox you can delete the original .iso file. Not with FreeDOS. You need the .iso file if you want to install applications via the FreeDOS package manager. I generally keep the ,iso file attached the virtual machine in case I want to install something. If you do that, you have to make sure that you tell FreeDOS you want to boot from the hard drive each time you boot it up because it defaults to the attached CD/iso. If you forget to attach the .iso, don’t worry. You can do so by selecting “Devices” on the top of your FreeDOS virtual machine window. The .iso files are listed under “Optical Drives”.

Step 5 – Install FreeDOS

Now that we’ve completed all of the preparations, let’s install FreeDOS.

First, you need to be aware of a bug in the most recent version of VirtualBox. If you start the virtual machine that we just created and select “Install to harddisk” when the FreeDOS welcome screen appears, you will see an unending, scrolling mass of machine code. I’ve only run into this issue recently and it affects both the Linux and Windows versions of VirtualBox. (I know first hand.)

To get around this, you need to make a simple edit. When you see the FreeDOS welcome screen, press Tab. (Make sure that the “Install to harddrive” option is selected.) Type the word raw after “fdboot.img” and hit Enter. The FreeDOS installer will then start.

The first part of the installer will handle formatting your virtual drive. Once formatting is completed, the installer will reboot. When the FreeDOS welcome screen appears again, you will have to re-enter the raw comment you used earlier.

Make sure that you select “Yes” on all of the questions in the installer. One important question that doesn’t have a “Yes” or “No” answer is: “What FreeDOS packages do you want to install?. The two options are “Base packages” or “Full installation”. Base packages are for those who want a DOS experience most like the original MS-DOS. The Full installation includes a bunch of tools and utilities to improve DOS.

At the end of the installation, you will be given the option to reboot or stay on DOS. Select “reboot”.

Step 6 – Setup Networking

Unlike the original DOS, FreeDOS can access the internet. You can install new packages and update the ones already you have installed. In order to use networking, you need to install several applications in FreeDOS.

First, boot into your newly created FreeDOS virtual machine. At the FreeDOS selection screen, select “Boot from System harddrive”.

Now, to access the FreeDOS package manager, type fdimples. You can navigate around the package manager with the arrow keys and select categories or packages with the space bar. From the “Networking” category, you need to select fdnet. The FreeDOS Project also recommends installing mtcp and wget. Hit “Tab” several times until “OK” is selected and press “Enter”. Once the installation is complete, type reboot and hit enter. After the system reboots, boot to your system drive. If the network installation was successful, you will see several new messages at the terminal listing your network information.

Note

Sometimes the default VirtualBox setup doesn’t work. If that happens, close your FreeDOS VirtualBox window. Right-click your virtual machine from the main VirtualBox screen and select “Settings”. The default VirtualBox network setting is “NAT”. Change it to “Bridged Adapter” and retry installing the FreeDOS packages. It should work now.

Step 7 – Basic Usage of FreeDOS

Commons Commands

Now that you have installed FreeDOS, let’s look at a few basic commands. If you have ever used the Command Prompt on Windows, you will be familiar with some of these commands.

  • DIR– display the contents of the current directory
  • CD – change the directory you are currently in
  • COPY OLD.TXT NEW.TXT– copy files
  • TYPE TEST.TXT – display content of file
  • DEL TEST.TXT – delete file
  • XCOPY DIR NEWDIR – copy directory and all of its contents
  • EDIT TEST.TXT– edit a file
  • MKDIR NEWDIR – create a new directory
  • CLS – clear the screen

You can find more basic DOS commands on the web or the handy cheat sheet created by Jim Hall.

Running a Program

Running program on FreeDos is fairly easy. When you install an application with the fdimples package manager, be sure to note where the .EXE file of the application is located. This is shown in the application’s details. To run the application, you generally need to navigate to the application folder and type the application’s name.

For example, FreeDOS has an editor named FED that you can install. After installing it, all you need to do is navigate to C:FED and type FED.

Sometimes a program, such as Pico, is stored in the bin folder. These programs can be called up from any folder.

Games usually have an .EXE program or two that you have to run before you can play the game. These setup file usually fix sound, video, or control issues.

If you run into problems that this tutorial didn’t cover, don’t forget to visit the home of FreeDOS. They have a wiki and several other support options.

Have you ever used FreeDOS? What tutorials would you like to see in the future? Please let us know in the comments below.

If you found this article interesting, please take a minute to share it on social media, Hacker News or Reddit.

Source

Download OpenBSD 6.4

OpenBSD is a free project that delivers a multi-platform UNIX-like operating system that is portable, efficient, secure, and based on the 4.4BSD platform. It is a powerful server product used on hundreds of thousands of computers worldwide.

Availability, boot options, supported platforms

The operating system is freely available for download from the dedicated section (see above) as ISO images or binary packages that allow users to install it over the network. The ISO images can be burned onto CD discs, bootable directly from the BIOS of most PCs.

OpenBSD supports binary emulation of most programs from SVR4 (Solaris), FreeBSD, Linux, BSD, SunOS and HP-UX. It can be installed on a wide range of architectures, including i386, sparc64, alpha, m68k, sh, amd64, PowerPC, m88k, sparc, ARM, hppa, vax, mips64, and mips64el.

The CD image boots automatically without user interaction and will ask them if they want to manually install, upgrade or automatically install the operating system, as well as to drop to a shell prompt.

Manual or automatic installation

A standard (read: manual) installation will require users to choose a keyboard layout, set the hostname, choose a network interface and configure it with IPv4 and/or IPv6, as well as to set a new password for the root (system administrator) account.

In addition, you can choose to start the SSH and NTP services when the system starts, choose if you want to use the X Window System or not, setup a user, choose a timezone, partition the disk drive, and install sets.

Among the included software packages available for OpenBSD, we can mention the GNOME, KDE and Xfce desktop environments, the MySQL, PostgreSQL, Postfix and OpenLDAP servers, the Mozilla Firefox, Mozilla Thunderbird, LibreOffice, Emacs, Vim and Chromium apps, as well as the PHP, Python, Ruby, Tcl/Tk, JDK, Mono and Go programming languages.

Bottom line

Summing up, OpenBSD is a powerful and highly acclaimed server-oriented BSD/UNIX operating system that provides us with state-of-the-art software, including OpenSSH, OpenNTPD, OpenSMTPD, OpenBGPD, OpenIKED, and mandoc.

Source

The Brains Behind the Books – Part V: Liam Proven

Share with friends and colleagues on social media

The content of this article has been contributed by Liam Proven, Technical Writer at the SUSE Documentation Team. It is part of a series of articles focusing on SUSE Documentation and the great minds that create the manuals, guides, quick starts, and many more helpful documents.

The Wanderer

I am a wanderer. My name is Liam Proven. I’m an Englishman with an Irish citizenship, living in the Czech Republic, working for a German company – that pretty much says it all, doesn’t it? But there’s more…

I was born in the North-West of England, just outside Liverpool. But my family moved to Nigeria when I was small, and stayed for nearly 10 years. Thus many of my early memories are from there. When we came back to England, or rather Liverpool, my parents couldn’t find a place they liked. And if that weren’t enough, unfortunately one day I got shot in the back riding my bicycle after school. So my parents decided to move somewhere quieter – and safer – than Liverpool. They picked the Isle of Man, a little independent island nation with the world’s oldest continuous government. That’s where I spent my teens.

I went to lots of different kinds of schools, in England, West Africa, and finally the Isle of Man. Most subjects I was good at – except mathematics, history, and French. Somehow I even passed French. But only because I was pig-headed: The teacher asked me to drop out as I was bottom of the class. Of course, that made me determined to prove him wrong! In addition, I thought French would be more use than, for example, Religious Studies. To paraphrase Terry Pratchett, at least there was empirical evidence that France was real – I’d been there.

Things Never Happen as Planned

My mum wanted me to be a doctor, and my dad wanted me to take over running the “family business” – running an old people’s home. I wasn’t interested, I’m afraid. My heroes predominantly were several leading scientists. Botanist David Bellamy, who later became a climate-change sceptic and so fell off my list. James Lovelock, who formulated the Gaia hypothesis. Richard Feynman, not merely for his giant intellect but his wit and humor, ability to explain things, and his curiosity. Richard Dawkins, who I’ve seen speak once . My plan was to be a biologist, possibly a marine microbiologist. So I started to study biology.

Things turned out differently. Unfortunately I crashed my bicycle at the end of the first year, smashing my right forearm. It needed three surgeries: First they implanted screws and metal plates, and when those snapped, I got a bone graft from my right hip. I couldn’t use my arm for roughly a year, but being 18 years old and cocky, I didn’t listen to the advice of my parents, my doctors and my tutors. I went back to university and did my second year with one hand. (I’m left handed. I thought I could cope. I was wrong.) That was my first big life mistake. In just one year, I went from winning the department prize for best student to being at the bottom and threatened with expulsion. No wonder I nearly failed and messed up my degree. But even more important, I discovered that there were no jobs in biology without a doctorate!

Tech Times

So I went off to do stuff with computers instead. They were only my hobby so far. But people would pay me money to make them work. My first real job was a “junior software support” position. I had applied for a junior hardware engineer job, but they quickly worked out I knew little about hardware. I taught myself the PC and Mac by porting my home-grown suite of fractal-graphics generators to DOS and System 6. Since then I had a dozen different jobs or so. My most stressful job by far was running a stockbrokers’ dealing room in the City of London. That’s the equivalent of a heart-surgeon in IT. My systems were extremely reliable, but when both the uplinks to HQ failed, we lost hundreds of millions of dollars per hour, and there was nothing I could do about it.

And I spent a long time freelancing, doing IT consultancy and technical journalism. I’ve been published around the world, on at least 4 continents, in multiple languages. I have two tiny specialist books on Amazon for download. That does feel good. There were some British IT journalists I hugely admired, and who had some influence on my career. The late Guy Kewney sticks out, and Dick Pountain. I was lucky enough to work with, and become friends with, both. But regrettably, in my view, the tech journalism market is dying.

Even if I was an early adopter of Windows – I used Windows 2.01 – these days I strongly prefer working with Linux. I first tried Linux in 1996, with Lasermoon Linux-FT – the first ever live CD distro. I installed it but wasn’t brave enough to change my bootloader. I thought that Linux was going to be the next big thing. That was a good call. The first distro I used as my main desktop for a while was Caldera OpenLinux, with KDE 1.0. It was interesting but a lot of stuff didn’t work back then in the late 1990s. By 2001, I was using SUSE Linux Professional full-time. I had a multiprocessor PC at home and I didn’t like Windows XP much. At that time I had also already started to install and write about SUSE and Red Hat server stuff. Computers and building up technical knowledge were my hobby for a long time. I played around and learned. Now, to be honest, I use a Mac at home. I got tired of fixing my own computers. My laptops are second-hand ThinkPads with Linux, though – as I like 1980s and 1990s mechanical “clicky” keyboards.

Starting Again …

About a decade ago, I decided to switch from tech journalism to documentation. SUSE is my third such role. As mentioned, I used to be a SUSE user in my early days with desktop Linux. Thus I was delighted to be offered a role with a FOSS company again, and it feels good to be back. What I like most about my job as a Technical Writer is that I get to use two of my skills at once – technical knowledge and being able to write. SUSE somehow feels “pleasantly anarchic”. My colleagues are all absolutely wonderful. And the products work extremely well.

Nevertheless, sometimes I’m generally tempted to ‘start again’. I’m always keen on learning. Languages are a major interest (Czech is proving an exceptionally tough one, though). In all likelihood, I would study linguistics, or computer science. Contrary to popular belief, I think modern computers and software are terrible and we’ve lost a huge amount in the last few decades. We’re also approaching the next big paradigm shift in computing, after the minicomputer to microcomputer shift – and I’d like to help prepare for that.

Until Brexit, I was never engaged with politics at all. However, in the current worldwide political mood where freedom of expression can turn into a real risk, and where human rights are spurned, one cannot look away anymore. If I could have three wishes, my first wish would be a sudden end of the current mass dullness that paves the way for despotism. Secondly, I would ask for extra lifespan and perfect health. And my third wish would be to get more wishes! Then I’d ask for super-human power, which would let me add a few dozen extra Earth-like planets to the solar system and seed them with life. Perhaps something smarter than us can evolve before the Sun explodes.

If I won $1 million today, I would buy a Harley Davidson with a sidecar, and ride it round the world, while listening to “Chasing Rainbows” by Shed Seven. And of course with a copy of “The Hitchhiker’s Guide to the Galaxy” in my pocket.

Share with friends and colleagues on social media

Source

SUSE Joins OpenChain Project, Pine64 Making a Linux Smartphone, Linux Foundation Releases First Dev Kit for Its EdgeX Foundry Project, Mozilla Will Match Donations to the Tor Project and a New Version of RaspEX Linux for RPi Now Available

News briefs for October 25, 2018.

SUSE
recently joined the OpenChain Project
, which makes “open source license
compliance simpler and more consistent”. HPCWire notes that “conformance
with the OpenChain Specification confirms that an organization follows the
key requirements of a quality open source compliance program, and builds
trust between organizations in the supply chain”. In addition, SUSE is the
“first enterprise Linux distributor to earn conformance with the OpenChain
Project Specification”.

Pine64 is making a Linux smartphone that runs KDE Plasma. According to the FOSSBYTES
post
,
the devices will be called PinePhone and PineTab, and Pine64 will begin
sending the first PinePhone developer kits to selected devs for free in November. The
open-source Linux smartphone is expected to start at around $100.

The Linux Foundation has released the first developer kit for its EdgeX
Foundry project
, which is for “developing open source edge computing
middleware”. The kit is Ubuntu-based and is “built around an octa-core Samsung
Artik 710 Starter Kit teamed with a GrovePi+ I/O board. Future kits will
include an Artik 530 kit, and eventually, a Raspberry Pi/GrovePi+
combination.”

The Tor Project has announced that Mozilla will match all donations to the
project through the end of the year. ZDNet
reports
that Mozilla matched $200,000 in donations to Tor last year.
This year, Tor plans to use the funds to “increase the capacity
modularization and scalability of the Tor network”; “better test for,
measure, and design solutions around internet censorship”; and “strengthen
development of the Tor Browser for Android”.

A new version of RaspEX Linux for Raspberry Pi has been released. This new
version as based on Ubuntu 18.10 and uses the LXDE desktop. According to Softpedia
News
, “RaspEX LXDE Build 181022 is powered by the Linux 4.14.76 LTS
kernel built for the ARMv8 architecture, which means that it supports the
original Raspberry Pi 3 Model B single-board computer, as well as the
latest Raspberry Pi 3 Model B+ variant. However, you can also use a 32-bit
kernel, Linux 4.14.74 LTS.” New packages included in this version are
Raspotify (a Spotify Connect client for RPi), Putty, RealVNC and Samba.

Source

Linux Foundation Deals For LSB Followers – ls /blog


We are delighted to be able to team up with The Linux Foundation to bring you some great deals on amazing Linux courses and materials. All courses, on completion is another new certificate on your CV and makes you stand out from the usual Windows/Mac crowd.

Linux is used in more servers around the globe than any other platform and Linux Foundation courses focus on the skills you need to be able to administer servers, run containers, make bash scrips for automation and build applications.

Click on any of the links for more information and enjoy the course materials and the bump in your career!!

Hyperledger Fabric Fundamentals (LFD271)

Learn the fundamental concepts of blockchain and distributed ledger technologies with this course on Hyperledger Fabric.

$299 REGISTERS YOU FOR OUR NEWEST SELF PACED COURSE! LFD201 – INTRODUCTION TO OPEN SOURCE DEVELOPMENT, GIT, AND LINUX!

Learn how to develop open source software. This course focuses on open source software, an introduction to Linux systems and the use of Git, the revision control system.

REGISTER TODAY FOR YOUR KUBERNETES FOR DEVELOPERS (LFD259) COURSE AND CKAD CERTIFICATION TODAY! $499!

Kubernetes is a high-velocity open source orchestration tool to deploy, scale, and update containerized applications. This course will teach you how to containerize, host, deploy, and configure an application in a multi-node cluster.

The topics covered are directly aligned with the knowledge domains tested by the Cloud Native Computing Foundation Certified Kubernetes Application Developer (CKAD) Program, and will substantially increase students’ ability to become certified.

$199 ENROLLS YOU INTO OUR SELF PACED COURSE – LFS264 – OPNFV FUNDAMENTALS!

Learn about the fundamentals of the Linux Foundation OPNFV project and how it can help accelerate your Network Functions Virtualization (NFV) transformation from fixed-function, proprietary devices to flexible, software-driven environments. Solidify your learning of OPNFV with self-paced labs!

So that’s just a taste of the deals we were able to wrangle with The Linux Foundation. Linus is back to work now!!

Live Linux, sleep Linux, dream Linux, just don’t eat Linus/

Thanks for reading and comment if you’d like a deal on any different course from The Linux Foundation and we will try to get a better price for you. We like to look after our readers…

QuBits 2018-10-25

Source

mod_proxy Installation and Configuration on Apache

mod_proxy installation on Apache

Introduction

mod_proxy is a proxy/gateway for the Apache server. It allows you to direct Apache requests to other sites and/or ports within the web server. It can also support load balancing algorithms as well. This guide assumes you already have Apache 2.2 installed from source to build the modules. To read more about it you can review the module documentation on Apache’s mod_proxy page

Install mod_proxy

Go to the source directory of the Apache installation

cd /usr/src/httpd-2.2.24

Replace the path with where you downloaded the Apache installation.

Reconfigure the existing apache configuring appending the mod_proxy lines

./config-nice –enable-proxy=shared

Rebuild Apache:

make

Install the new Apache

make install

Once you have done that you will want to edit the Apache Configuration to load the modules

vim /etc/httpd/conf/httpd.conf

Add the following modules and save the file

LoadModule proxy_module lib/apache/mod_proxy.so
LoadModule proxy_http_module lib/apache/mod_proxy_http.so
LoadModule proxy_balancer_module lib/apache/mod_proxy_balancer.so
LoadModule proxy_connect_module lib/apache/mod_proxy_connect.so
LoadModule proxy_ftp_module lib/apache/mod_proxy_ftp.so
LoadModule proxy_scgi_module lib/apache/mod_proxy_scgi.so
LoadModule proxy_ajp_module lib/apache/mod_proxy_ajp.so

Restart Apache to load them

service httpd restart

Configure mod_proxy

Once mod_proxy is loaded you can now configure it to work on domains.

Reverse Proxy Configuration:

<VirtualHost 192.168.1.10:80>
ServerName domain.com
ProxyPreserveHost On
ProxyPass / http://127.0.0.1:8080/
ProxyPassReverse / http://127.0.0.1:8080/
</VirtualHost>

This example will pass requests to the same server on port :8080. You could utilize this to pass requests do a different application, java, ruby, tomcat etc.

SSL Reverse Proxy Configuration:

<VirtualHost 192.168.1.10:443>
ServerName domain.com
ProxyPreserveHost On
ProxyPass / http://127.0.0.1:8080/
ProxyPassReverse / http://127.0.0.1:8080/
SSLCertificateFile /path/to/certificate.crt
SSLCertificateKeyFile /path/to/certificate.key
SSLCertificateChainFile /path/to/chainfile.crt
</VirtualHost>

This configuration is almost identical except you are setting the variables for SSL Configuration.

Load Balancing Proxy Configuration:

This allows you to utilize multiple back-end servers with a single Apache front-end load balancing the requests.

<Proxy balancer://cluster>
BalancerMember http://192.168.1.10:8080/
BalancerMember http://192.168.1.11:8080/
</Proxy>

<VirtualHost 192.168.1.10:80>
ServerName domain.com
ProxyPass / balancer://cluster
</VirtualHost>

You would add in the IP addresses for each of the members to be load balanced as BalancerMember.

Once you have added the new configurations, you go ahead and restart apache again to load in the new mod_proxy settings

service httpd restart

May 22, 2017LinuxAdmin.io

Source

WP2Social Auto Publish Powered By : XYZScripts.com