Home » Archive

Articles in the Linux Category

Clustering, Featured, Glassfish, Headline, How-to, Java, Linux, Shell »

[4 May 2011 | 3 Comments | ]

Finlay is here. For me, Glassfish 3.1, was one of most awaited piece of software, for all it’s new features and clustering support. Glassfish 3.1 slightly changed the way to install cluster, in a much better and integrated way. This version come with a lot of new functionality, but also with improved parts related to Glassfish 2.1.

(adsbygoogle = window.adsbygoogle || []).push({});

Share this post

Hide Bookmarks

Android, Google, Linux, Random »

[10 Feb 2011 | No Comment | ]

My new phone just arrived. Google Nexus S is a piece of “art”, full of features. For me is the perfect phone. I can read my email, rss feeds instantly and I can browse all my websites. Also the browser is a full featured browser (93 points from 100 in acid3 test, and in my firefox 3.6.13 under Ubuntu 10.10 I get 94 points 🙂 ) with Adobe Flash on a Super AMOLED 4 inch screen. Also the Android market is full of applications and games. Everything on this …

Bugs, Debian, Java, Kernel, Linux »

[8 Feb 2011 | 2 Comments | ]

This, probably, is a bug which was not spotted very often because is very obscure and the Debian guys moved very quick and fixed the problem. I know, I found a lot of bugs related to sun.jvm.hotspot.debugger.NoSuchSymbolException: Could not find symbol “gHotSpotVMTypeEntryTypeNameOffset”, but this is different. Usually was a problem of “striping symbols from libjvm.so”, but in my case wasn’t that. Also I found this error related to OpenJDK (I use Sun JDK) and the solution was to use -server flag to get the correct libjvm.so. Anyway it took me …

Debian, Linux »

[13 Jan 2011 | No Comment | ]

I’m curios how this Debian installer will look. The features are amazing:
Live Installer
Grub 2
Kernel 2.6.32
Xen support
UserMode Linux Support

(adsbygoogle = window.adsbygoogle || []).push({});

Share this post

Hide Bookmarks

Debian, Linux, Security »

[9 Jan 2011 | No Comment | ]

This is a little bit old, but is worth to mention it because on a lot of system is still working. The proof of concept code and a lot of details you will find here: http://bit.ly/fYpOtx . This exploit is based on 3 vulnerabilities found by Nelson Elhage (probably because of that exploit is named full-nelson). As I said the exploit is based on 3 vulnerabilities CVE-2010-4258, CVE-2010-3849 and CVE-2010-3850. The last 2 vulnerabilities are based on Econet protocol driver. If you don’t have this driver loaded exploit will not …