Home » Archive

Articles in the Debian Category

Apache, Debian, Featured, Headline, How-to, Php, Security »

[6 Jun 2011 | 6 Comments | ]

It’s been a while since I configured the latest Dynamic Mass Virtual Hosting Server. Last time I used mod_vhost_alias to create a dynamic virtual hosting and it worked without any problem for what we need in that time. Then we didn’t care about the ftp and virtual users, the sites was updated from web pages and security was pretty much handled by upload application who managed the virtual hosting. Now, the problem is a little bit changed: We need a secure sever which should support ftp virtual users with quota …

Clustering, Debian, Featured, Glassfish, How-to, Java »

[14 Mar 2011 | One Comment | ]

Why you choose SNMP when Glassfish have strong JMX support? I presume, the answer for all who use SNMP is (almost) the same: Because the architecture of current monitoring solution is not scalable enough, and I cannot load my monitoring servers with supplementary JAVA processes.

Share this post

Hide Bookmarks

Bugs, Debian, Java, Kernel, Linux »

[8 Feb 2011 | 2 Comments | ]

This, probably, is a bug which was not spotted very often because is very obscure and the Debian guys moved very quick and fixed the problem. I know, I found a lot of bugs related to sun.jvm.hotspot.debugger.NoSuchSymbolException: Could not find symbol “gHotSpotVMTypeEntryTypeNameOffset”, but this is different. Usually was a problem of “striping symbols from libjvm.so”, but in my case wasn’t that. Also I found this error related to OpenJDK (I use Sun JDK) and the solution was to use -server flag to get the correct libjvm.so. Anyway it took me …

Debian, Linux »

[13 Jan 2011 | No Comment | ]

I’m curios how this Debian installer will look. The features are amazing:
Live Installer
Grub 2
Kernel 2.6.32
Xen support
UserMode Linux Support
Ext4

Share this post

Hide Bookmarks

Debian, Linux, Security »

[9 Jan 2011 | No Comment | ]

This is a little bit old, but is worth to mention it because on a lot of system is still working. The proof of concept code and a lot of details you will find here: http://bit.ly/fYpOtx . This exploit is based on 3 vulnerabilities found by Nelson Elhage (probably because of that exploit is named full-nelson). As I said the exploit is based on 3 vulnerabilities CVE-2010-4258, CVE-2010-3849 and CVE-2010-3850. The last 2 vulnerabilities are based on Econet protocol driver. If you don’t have this driver loaded exploit will not …