<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>servers &#8211; lifeLinux: Linux Tips, Hacks, Tutorials, Ebooks</title>
	<atom:link href="https://lifelinux.com/tag/servers/feed/" rel="self" type="application/rss+xml" />
	<link>https://lifelinux.com</link>
	<description>All About Linux !</description>
	<lastBuildDate>Thu, 31 Jan 2013 01:00:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.5.9</generator>
	<item>
		<title>Repel port flood by CSF and IPT_Recent</title>
		<link>https://lifelinux.com/repel-port-flood-by-csf-and-ipt_recent/</link>
					<comments>https://lifelinux.com/repel-port-flood-by-csf-and-ipt_recent/#comments</comments>
		
		<dc:creator><![CDATA[Linux Killer]]></dc:creator>
		<pubDate>Thu, 31 Jan 2013 00:58:53 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[WebServer]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[Flood]]></category>
		<category><![CDATA[flood attack]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[port]]></category>
		<category><![CDATA[protocol]]></category>
		<category><![CDATA[servers]]></category>
		<guid isPermaLink="false">http://www.lifelinux.com/?p=1480</guid>

					<description><![CDATA[<p>Protect the server from Flood attacks , Using the property Port Flood Protection In firewall CSF . After doing the necessary settings will be able to determine the number of allowed connections Same time for each IP tries to connect to the server. So How to Make a flood attack ? Logically flood attacks are two ways : first through a specific [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://lifelinux.com/repel-port-flood-by-csf-and-ipt_recent/">Repel port flood by CSF and IPT_Recent</a> appeared first on <a rel="nofollow" href="https://lifelinux.com">lifeLinux: Linux Tips, Hacks, Tutorials, Ebooks</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p></p><p>Protect the server from Flood attacks , Using the property Port Flood Protection In firewall CSF . After doing the necessary settings will be able to determine the number of allowed connections Same time for each IP tries to connect to the server.</p>
<p><span id="more-1480"></span><br />
<strong>So How to Make a flood attack ?</strong><br />
Logically flood attacks are two ways :<br />
first through a specific communication<br />
the second through multiple connections each connection of these connections connect with the provider<br />
<strong>Requirements</strong></p>
<ol>
<li>Installing firewall CSF last version</li>
<li>Enabled IPT and works well</li>
<li>Model IPT_Recent special for IPT</li>
</ol>
<p><strong>Application</strong></p>
<p>Through edited the configuration file special for CSF it is located in the following path:</p>
<pre>root@server:$ nano /etc/csf/csf.conf</pre>
<p>We pressing CTRL + W and look for PORTFLOOD we will find the line as follows default :</p>
<pre>PORTFLOOD = " "</pre>
<p>put inside ” ” Settings that we want ,as in the following example:</p>
<pre>PORTFLOOD = "80;tcp;20;10"</pre>
<p>80 is the port , TCP is the protocol , 20 is the number of connections allowed at the same time , 10 is time of pause temporarily after the 10 seconds is allowed IP make new contacts</p>
<p><strong>Important note: </strong>ipt_recent can count 20 Packets for each Title , So you can change the number of connections from 1 to 20 only</p>
<p>Is there a possibility of adding more than one port ?yes be as follows (Just an example) :</p>
<pre>PORTFLOOD = "22;tcp;10;200,21;tcp;15;100,80;tcp;20;5"</pre>
<p><strong><span style="color: #000000;">Note</span> </strong>that when we add a new port we put a comma (,)</p>
<p>In the previous example you choose more than one port are 22, 21 and 80 And you can add more and you can change the number of connections and also change the protocol type, for example, from TCP to UDP after the completion of the edited we save the file : CTRL + X, Y, and then Enter button.</p>
<p>Finally, do not forget to restart CSF with the following command:</p>
<pre>root@server:$ csf -r</pre>
<p>Thank You ,,</p>
<g:plusone href="https://lifelinux.com/repel-port-flood-by-csf-and-ipt_recent/" size="standard"  annotation="none"   ></g:plusone><p>The post <a rel="nofollow" href="https://lifelinux.com/repel-port-flood-by-csf-and-ipt_recent/">Repel port flood by CSF and IPT_Recent</a> appeared first on <a rel="nofollow" href="https://lifelinux.com">lifeLinux: Linux Tips, Hacks, Tutorials, Ebooks</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://lifelinux.com/repel-port-flood-by-csf-and-ipt_recent/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>How Do I Block An IP Address On Linux Server ?</title>
		<link>https://lifelinux.com/how-do-i-block-an-ip-address-on-linux-server/</link>
					<comments>https://lifelinux.com/how-do-i-block-an-ip-address-on-linux-server/#respond</comments>
		
		<dc:creator><![CDATA[lifeLinux]]></dc:creator>
		<pubDate>Tue, 31 Jan 2012 11:06:46 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Sys Admin]]></category>
		<category><![CDATA[block ip iptables]]></category>
		<category><![CDATA[block ip linux]]></category>
		<category><![CDATA[block ip unix]]></category>
		<category><![CDATA[block ip via iptables]]></category>
		<category><![CDATA[block ip with iptables]]></category>
		<category><![CDATA[destination port]]></category>
		<category><![CDATA[firewall script]]></category>
		<category><![CDATA[interface name]]></category>
		<category><![CDATA[ip address]]></category>
		<category><![CDATA[ip subnet]]></category>
		<category><![CDATA[ip table blocking]]></category>
		<category><![CDATA[iptables]]></category>
		<category><![CDATA[iptables firewall]]></category>
		<category><![CDATA[iptables-restore command]]></category>
		<category><![CDATA[iptables-save]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[linux block ip]]></category>
		<category><![CDATA[linux block ip address]]></category>
		<category><![CDATA[linux command to block ip]]></category>
		<category><![CDATA[linux drop ip address]]></category>
		<category><![CDATA[linux server]]></category>
		<category><![CDATA[linux server how to block ip/user]]></category>
		<category><![CDATA[log target]]></category>
		<category><![CDATA[public interface]]></category>
		<category><![CDATA[sbin]]></category>
		<category><![CDATA[server port]]></category>
		<category><![CDATA[servers]]></category>
		<category><![CDATA[session block]]></category>
		<category><![CDATA[spoof]]></category>
		<category><![CDATA[syntax]]></category>
		<guid isPermaLink="false">http://www.lifelinux.com/?p=1326</guid>

					<description><![CDATA[<p>I run CentOS on my server, and I often find that my server is being attacked by other computers. Brute force SSH attacks, port scanning, viruses scanning for the ability to spread, things like that. In this article, I&#8217;ll show you how to block an IP address on Linux server using IPTables. The First, I&#8217;ll [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://lifelinux.com/how-do-i-block-an-ip-address-on-linux-server/">How Do I Block An IP Address On Linux Server ?</a> appeared first on <a rel="nofollow" href="https://lifelinux.com">lifeLinux: Linux Tips, Hacks, Tutorials, Ebooks</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p></p><p>I run CentOS on my server, and I often find that my server is being attacked by other computers. Brute force SSH attacks, port scanning, viruses scanning for the ability to spread, things like that. In this article, I&#8217;ll show you how to block an IP address on Linux server using IPTables.<br />
<span id="more-1326"></span><br />
The First, I&#8217;ll assume you are already using iptables. If you need help setting that up, read <a href="http://www.lifelinux.com/how-to-install-iptables-on-redhat-centos-linux/">this article</a>.</p>
<h2>How do I block an IP address ?</h2>
<p>Example I want to block incoming request from IP <span style="color: #ff0000;">1.2.3.4</span>, login as root and type the following command</p>
<pre># iptables -I INPUT -s <span style="color: #ff0000;">1.2.3.4</span> -j DROP</pre>
<p><strong>Where,</strong><br />
&#8211; I: Inserts the chain at the top of the rules.<br />
&#8211; s: Match source IP address.<br />
&#8211; j: Jump to the specified target chain when the packet matches the current rule.</p>
<p>To drop packets coming in on interface eth0 from <span style="color: #ff0000;">1.2.3.4</span>, type the following command</p>
<pre># iptables -I INPUT -i eth0 -s <span style="color: #ff0000;">1.2.3.4</span> -j DROP</pre>
<h2>How do I block a subnet ?</h2>
<p>Use the following syntax to block <span style="color: #ff0000;">10.0.0.0/8</span></p>
<pre># iptables -I INPUT -s <span style="color: #ff0000;">10.0.0.0/8</span> -j DROP</pre>
<h2>How do I save blocked IP address ?</h2>
<p>To save blocked IP address to iptables config file, type the following command</p>
<pre># service iptables save</pre>
<p>Or</p>
<pre># /etc/init.d/iptables save</pre>
<h2>How Do I Unblock An IP Address?</h2>
<p>First, you need to display blocked IP address along with line number and other information, type the following command</p>
<pre># iptables -L INPUT -n --line-numbers
# iptables -L INPUT -n --line-numbers | grep 1.2.3.4</pre>
<p>Sample outputs:</p>
<pre>Chain INPUT (policy DROP)
num  target     prot opt source               destination
1    DROP       all  --  1.2.3.4              0.0.0.0/0
2    LOCALINPUT  all  --  0.0.0.0/0            0.0.0.0/0
3    ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
4    ACCEPT     udp  --  203.162.4.1          0.0.0.0/0           udp spts:1024:65535 dpt:53</pre>
<p>To unblock 1.2.3.4 you must delete line number 1, enter:</p>
<pre># iptables -D INPUT 1</pre>
<g:plusone href="https://lifelinux.com/how-do-i-block-an-ip-address-on-linux-server/" size="standard"  annotation="none"   ></g:plusone><p>The post <a rel="nofollow" href="https://lifelinux.com/how-do-i-block-an-ip-address-on-linux-server/">How Do I Block An IP Address On Linux Server ?</a> appeared first on <a rel="nofollow" href="https://lifelinux.com">lifeLinux: Linux Tips, Hacks, Tutorials, Ebooks</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://lifelinux.com/how-do-i-block-an-ip-address-on-linux-server/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Linux Shutdown Command</title>
		<link>https://lifelinux.com/linux-shutdown-command/</link>
					<comments>https://lifelinux.com/linux-shutdown-command/#respond</comments>
		
		<dc:creator><![CDATA[lifeLinux]]></dc:creator>
		<pubDate>Wed, 24 Aug 2011 01:03:58 +0000</pubDate>
				<category><![CDATA[Sys Admin]]></category>
		<category><![CDATA[/var/log/wtmp]]></category>
		<category><![CDATA[/var/run/utmp]]></category>
		<category><![CDATA[24hr clock]]></category>
		<category><![CDATA[broadcast message]]></category>
		<category><![CDATA[CentOS shutdown command]]></category>
		<category><![CDATA[command line options]]></category>
		<category><![CDATA[Debian shutdown command]]></category>
		<category><![CDATA[Fedora shutdown command]]></category>
		<category><![CDATA[Gentoo shutdown command]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[linux server]]></category>
		<category><![CDATA[linux shutdown]]></category>
		<category><![CDATA[Mandriva shutdown command]]></category>
		<category><![CDATA[OpenSUSE shutdown command]]></category>
		<category><![CDATA[option requests]]></category>
		<category><![CDATA[Redhat shutdown command]]></category>
		<category><![CDATA[remote server]]></category>
		<category><![CDATA[RHEL shutdown command]]></category>
		<category><![CDATA[root user]]></category>
		<category><![CDATA[safe way]]></category>
		<category><![CDATA[servers]]></category>
		<category><![CDATA[shutdown command]]></category>
		<category><![CDATA[Slackware shutdown command]]></category>
		<category><![CDATA[ssh command]]></category>
		<category><![CDATA[Suse shutdown command]]></category>
		<category><![CDATA[system shutdown]]></category>
		<category><![CDATA[Ubuntu shutdown command]]></category>
		<guid isPermaLink="false">http://www.lifelinux.com/?p=1017</guid>

					<description><![CDATA[<p>shutdown command brings the system down in a secure way. All logged-in users are notified that the system is going down, and login is blocked. It is possible to shut the system down immediately or after a specified delay. All processes are first notified that the system is going down by the signal SIGTERM. This [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://lifelinux.com/linux-shutdown-command/">Linux Shutdown Command</a> appeared first on <a rel="nofollow" href="https://lifelinux.com">lifeLinux: Linux Tips, Hacks, Tutorials, Ebooks</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p></p><blockquote><p>shutdown command brings the system down in a secure way. All logged-in users are notified that the system is going down, and login is blocked. It is possible to shut the system down immediately or after a specified delay. All processes are first notified that the system is going down by the signal SIGTERM. This gives programs like vi the time to save the file being edited, mail and news processing programs a chance to exit cleanly, etc. shutdown does its job by signalling the init process, asking it to change the runlevel. Runlevel 0 is used to halt the system, runlevel 6 is used to reboot the system, and runlevel 1 is used to put to system into a state where administrative tasks can be performed; this is the default if neither the -h or -r flag is given to shutdown. To see which actions are taken on halt or reboot see the appropriate entries for these runlevels in the file /etc/inittab.(http://linux.about.com/od/commands/l/blcmdl8_shutdow.htm)</p></blockquote>
<p><span id="more-1017"></span></p>
<h2>Shutdown the machine immediately</h2>
<p>Type the following command as root</p>
<pre>
# shutdown -h now
</pre>
<h2>Shutdown the machine with user defined message</h2>
<pre>
# shutdown -h now 'Server is going down for replace old hardware'
</pre>
<h2>Scheduling the shutdown</h2>
<p>Example, schedule shutdown for 3 AM.</p>
<pre>
# shutdown -h 03:00
</pre>
<p>Schedule shutdown the system in 5 minutes</p>
<pre>
# shutdown -h +5
</pre>
<h2>Reboot the machine immediately</h2>
<pre>
# shutdowm -r now
</pre>
<h2>Cancel a running shutdown</h2>
<pre>
# shutdown -c
</pre>
<g:plusone href="https://lifelinux.com/linux-shutdown-command/" size="standard"  annotation="none"   ></g:plusone><p>The post <a rel="nofollow" href="https://lifelinux.com/linux-shutdown-command/">Linux Shutdown Command</a> appeared first on <a rel="nofollow" href="https://lifelinux.com">lifeLinux: Linux Tips, Hacks, Tutorials, Ebooks</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://lifelinux.com/linux-shutdown-command/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>10 lsof Command Examples</title>
		<link>https://lifelinux.com/10-lsof-command-examples/</link>
					<comments>https://lifelinux.com/10-lsof-command-examples/#respond</comments>
		
		<dc:creator><![CDATA[lifeLinux]]></dc:creator>
		<pubDate>Sat, 14 May 2011 16:41:13 +0000</pubDate>
				<category><![CDATA[Bash Shell]]></category>
		<category><![CDATA[Sys Admin]]></category>
		<category><![CDATA[command line options]]></category>
		<category><![CDATA[fuser command]]></category>
		<category><![CDATA[grep command]]></category>
		<category><![CDATA[grep program]]></category>
		<category><![CDATA[internet connections]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[linux-distributions]]></category>
		<category><![CDATA[list open files]]></category>
		<category><![CDATA[ls command]]></category>
		<category><![CDATA[lsof]]></category>
		<category><![CDATA[lsof command]]></category>
		<category><![CDATA[netstat command]]></category>
		<category><![CDATA[operating system]]></category>
		<category><![CDATA[port numbers]]></category>
		<category><![CDATA[process id]]></category>
		<category><![CDATA[proto]]></category>
		<category><![CDATA[ps command]]></category>
		<category><![CDATA[running processes]]></category>
		<category><![CDATA[servers]]></category>
		<category><![CDATA[sockets]]></category>
		<category><![CDATA[udp]]></category>
		<category><![CDATA[UNIX]]></category>
		<guid isPermaLink="false">http://www.lifelinux.com/?p=523</guid>

					<description><![CDATA[<p>The lsof command or &#8220;list open files&#8221; command in Linux is a powerful tool. In Linux and Unix everything behind the scenes are just files. This includes IP sockets, pipes, unix sockets, directories, devices, even inodes are just files. This means that lsof can actually tell you a lot of information of what is going [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://lifelinux.com/10-lsof-command-examples/">10 lsof Command Examples</a> appeared first on <a rel="nofollow" href="https://lifelinux.com">lifeLinux: Linux Tips, Hacks, Tutorials, Ebooks</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p></p><p>The <strong>lsof command</strong> or &#8220;list open files&#8221; command in Linux is a powerful tool. In Linux and Unix everything behind the scenes are just files. This includes IP sockets, pipes, unix sockets, directories, devices, even inodes are just files. This means that lsof can actually tell you a lot of information of what is going on on your system.<span id="more-523"></span></p>
<h3>Synopsis</h3>
<pre>
lsof [ -?abChlnNOPRstUvVX ] [ -A A ] [ -c c ] [ +|-d d ] [ +|-D D ] [ +|-f [cfgGn] ] [ -F [f] ] [ -g [s] ] [ -i [i] ] [ -k k ] [ +|-L [l] ] [ -m m ] [ +|-M ] [ -o [o] ] [ -p s ] [ +|-r [t] ] [ -S [t] ] [ -T [t] ] [ -u s ] [ +|-w ] [ -- ] [names] 
</pre>
<h3>Example 1: Show all opened files</h3>
<p>Type the following command</p>
<pre>
lsof | more
</pre>
<p>Sample outputs</p>
<pre>
COMMAND     PID      USER   FD      TYPE     DEVICE      SIZE       NODE NAME
init          1      root  cwd       DIR      253,4      4096          2 /
init          1      root  rtd       DIR      253,4      4096          2 /
init          1      root  txt       REG      253,4     38652   41746599 /sbin/init
init          1      root  mem       REG      253,4    129900   16252964 /lib/ld-2.5.so
init          1      root  mem       REG      253,4   1693812   16252965 /lib/libc-2.5.so
init          1      root  mem       REG      253,4     20668   16253168 /lib/libdl-2.5.so
init          1      root  mem       REG      253,4    245376   16253222 /lib/libsepol.so.1
init          1      root  mem       REG      253,4     93508   16253815 /lib/libselinux.so.1
init          1      root   10u     FIFO       0,17                 1277 /dev/initctl
...
</pre>
<h3>Example 2: Show all opened internet sockets</h3>
<p>Using the -i flag lsof will list the internet sockets currently opened</p>
<pre>
lsof -i
</pre>
<p>Sample outputs</p>
<pre>
COMMAND     PID   USER   FD   TYPE   DEVICE SIZE NODE NAME
sshd       2537   root    3u  IPv6     5348       TCP *:rockwell-csp2 (LISTEN)
mysqld     2625  mysql   11u  IPv4     5463       TCP *:mysql (LISTEN)
httpd      2731 apache    3u  IPv6 30048993       TCP *:http (LISTEN)
...
</pre>
<h3>Example 3: Shows all networking related to a given port 80</h3>
<pre>
lsof -i :80
</pre>
<p>Sample outputs</p>
<pre>
COMMAND   PID   USER   FD   TYPE   DEVICE SIZE NODE NAME
httpd    2731 apache    3u  IPv6 30048993       TCP *:http (LISTEN)
httpd    2731 apache   58u  IPv6 39448263       TCP server.com:http->adsl-dynamic-pool-xxx.hcm.fpt.vn:23527 (ESTABLISHED)
httpd    2731 apache   60u  IPv6 39448302       TCP server.com:http->crawl-66-249-69-83.googlebot.com:35190 (ESTABLISHED)
httpd    2731 apache   61u  IPv6 39448336       TCP server.com:http->v16-13.opera-mini.net:37548 (ESTABLISHED)
httpd    2731 apache   62u  IPv6 39448388       TCP server.com:http->v16-13.opera-mini.net:37561 (ESTABLISHED)
httpd    2731 apache   64u  IPv6 39447543       TCP server.com:http->adsl.viettel.vn:13636 (FIN_WAIT2)
</pre>
<h3>Example 4: Show all TCP/UDP connections</h3>
<pre>
lsof -i TCP
</pre>
<p>Sample outputs</p>
<pre>
sshd       2537   root    3u  IPv6     5348       TCP *:rockwell-csp2 (LISTEN)
mysqld     2625  mysql   11u  IPv4     5463       TCP *:mysql (LISTEN)
httpd      2731 apache    3u  IPv6 30048993       TCP *:http (LISTEN)
...
</pre>
<h3>Example 5: List open files associated with process ID</h3>
<p>The flag +p will display all open files associated with specific process ID, example with process ID is 2625</p>
<pre>
lsof +p 2625
</pre>
<p>Sample outputs</p>
<pre>
COMMAND  PID  USER   FD   TYPE     DEVICE      SIZE     NODE NAME
mysqld  2625 mysql  cwd    DIR      253,4      4096 21495811 /var/lib/mysql
mysqld  2625 mysql  rtd    DIR      253,4      4096        2 /
mysqld  2625 mysql  txt    REG      253,4   7020300 50999198 /usr/libexec/mysqld
mysqld  2625 mysql  DEL    REG      253,4           16253135 /lib/libcrypto.so.0.9.8e.#prelink#.64u8kX
mysqld  2625 mysql  mem    REG      253,4           16252984 /lib/libm-2.5.so (path inode=16253122)
mysqld  2625 mysql  DEL    REG      253,4           50996047 /usr/lib/libgssapi_krb5.so.2.2.#prelink#.YYIHuy
mysqld  2625 mysql  mem    REG      253,4           16252990 /lib/libselinux.so.1 (path inode=16253815)
mysqld  2625 mysql  mem    REG      253,4           16256252 /lib/libsepol.so.1 (path inode=16253222)
mysqld  2625 mysql  mem    REG      253,4     50848 16253138 /lib/libnss_files-2.5.so
mysqld  2625 mysql  mem    REG      253,4           16253825 /lib/librt-2.5.so (path inode=16253220)
mysqld  2625 mysql  mem    REG      253,4           16252942 /lib/ld-2.5.so (path inode=16252964)
mysqld  2625 mysql  mem    REG      253,4           50996107 /usr/lib/libstdc++.so.6.0.8 (path inode=50989584)
mysqld  2625 mysql  mem    REG      253,4           50996061 /usr/lib/libkrb5.so.3.3 (path inode=50999803)
mysqld  2625 mysql  mem    REG      253,4           16252980 /lib/libdl-2.5.so (path inode=16253168)
...
</pre>
<h3>Example 6: Show what a given user has open</h3>
<p>The flag -u will show what a given user has open</p>
<pre>
lsof -u apache
</pre>
<p>Sample outputs</p>
<pre>
COMMAND   PID   USER   FD   TYPE     DEVICE      SIZE     NODE NAME
httpd    2731 apache  cwd    DIR      253,4      4096        2 /
httpd    2731 apache  rtd    DIR      253,4      4096        2 /
httpd    2731 apache  txt    REG      253,4   3120954 51157630 /usr/local/apache/bin/httpd
httpd    2731 apache  mem    REG      253,4    375710 51157607 /usr/local/apache/lib/libaprutil-1.so.0.3.10
httpd    2731 apache  mem    REG      253,4     45432 16253184 /lib/libcrypt-2.5.so
httpd    2731 apache  mem    REG      253,4      7748 16253849 /lib/libcom_err.so.2.1
httpd    2731 apache  mem    REG      253,4      7880 16253845 /lib/libkeyutils-1.2.so
httpd    2731 apache  mem    REG      253,4    937178 51157689 /usr/local/apache/modules/mod_security2.so
httpd    2731 apache  mem    REG      253,4    129208 16253851 /lib/libpcre.so.0.0.1
...
</pre>
<g:plusone href="https://lifelinux.com/10-lsof-command-examples/" size="standard"  annotation="none"   ></g:plusone><p>The post <a rel="nofollow" href="https://lifelinux.com/10-lsof-command-examples/">10 lsof Command Examples</a> appeared first on <a rel="nofollow" href="https://lifelinux.com">lifeLinux: Linux Tips, Hacks, Tutorials, Ebooks</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://lifelinux.com/10-lsof-command-examples/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How To Install Ksplice on CentOS / RedHat</title>
		<link>https://lifelinux.com/how-to-install-ksplice-on-centos-redhat/</link>
					<comments>https://lifelinux.com/how-to-install-ksplice-on-centos-redhat/#respond</comments>
		
		<dc:creator><![CDATA[lifeLinux]]></dc:creator>
		<pubDate>Thu, 12 May 2011 01:34:39 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Sys Admin]]></category>
		<category><![CDATA[CentOS kernel hot patching]]></category>
		<category><![CDATA[Debian kernel hot patching]]></category>
		<category><![CDATA[Fedora kernel hot patching]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[kernel hot patching]]></category>
		<category><![CDATA[kernel updates]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Linux kernel hot patching]]></category>
		<category><![CDATA[linux-distributions]]></category>
		<category><![CDATA[network proxy]]></category>
		<category><![CDATA[OpenSuse kernel hot patching]]></category>
		<category><![CDATA[patching]]></category>
		<category><![CDATA[proxy setting]]></category>
		<category><![CDATA[reboot]]></category>
		<category><![CDATA[Redhat kernel hot patching]]></category>
		<category><![CDATA[RHEL kernel hot patching]]></category>
		<category><![CDATA[rpm]]></category>
		<category><![CDATA[security updates]]></category>
		<category><![CDATA[servers]]></category>
		<category><![CDATA[Slackware kernel hot patching]]></category>
		<category><![CDATA[Suse kernel hot patching]]></category>
		<category><![CDATA[Ubuntu kernel hot patching]]></category>
		<category><![CDATA[upgrades]]></category>
		<category><![CDATA[uptime]]></category>
		<category><![CDATA[yum]]></category>
		<guid isPermaLink="false">http://www.lifelinux.com/?p=446</guid>

					<description><![CDATA[<p>You can apply kernel updates using &#8220;yum&#8221; command or &#8220;apt-get&#8221; command line options. After each upgrade you need to reboot the server. How to skip reboot step and apply hotfixes to kernel without rebooting the server ? What is Ksplice Uptrack? Ksplice Uptrack is a subscription service that lets you apply 100% of the important [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://lifelinux.com/how-to-install-ksplice-on-centos-redhat/">How To Install Ksplice on CentOS / RedHat</a> appeared first on <a rel="nofollow" href="https://lifelinux.com">lifeLinux: Linux Tips, Hacks, Tutorials, Ebooks</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p></p><p>You can apply <strong>kernel updates</strong> using &#8220;yum&#8221; command or &#8220;apt-get&#8221; command line options. After each upgrade you need to reboot the server. How to skip reboot step and apply hotfixes to kernel without rebooting the server ?</p>
<h3>What is Ksplice Uptrack?</h3>
<p><strong>Ksplice Uptrack</strong> is a subscription service that lets you apply 100% of the important kernel security updates released by your Linux vendor without rebooting.<span id="more-446"></span></p>
<h3>Install Ksplice</h3>
<p>First, you&#8217;ll need an access key. If you don’t have one, <a href="https://www.ksplice.com/signup">request a free trial</a>.<br />
Download the Ksplice Uptrack repository installation RPM package</p>
<pre>
[root@lifelinux ~]# wget https://www.ksplice.com/yum/uptrack/centos/ksplice-uptrack-release.noarch.rpm
</pre>
<p>To install, type the following command as root</p>
<pre>
[root@lifelinux ~]# rpm -ivh ksplice-uptrack-release.noarch.rpm
[root@lifelinux ~]# yum -y install uptrack
</pre>
<p>Edit /etc/uptrack/uptrack.conf, enter </p>
<pre>
[root@lifelinux ~]# vi /etc/uptrack/uptrack.conf
</pre>
<p>Sample outputs</p>
<pre>
[Auth]
accesskey = [ACCESS KEY HERE]

[Network]
# Proxy to use when accessing the Uptrack server, of the form
# [protocol://][:port]

# The proxy must support making HTTPS connections. If this is unset,
# Uptrack will look for the https_proxy, HTTPS_PROXY, and http_proxy
# environment variables in that order, and then finally look for a
# proxy setting in the system-wide GConf database, if available.
https_proxy =

[Settings]
# Automatically install updates at boot time. If this is set, on
# reboot into the same kernel, Uptrack will re-install the same set of
# updates that were present before the reboot.
install_on_reboot = yes

# Options configuring the Uptrack cron job.
#
# GUI users will get all notices via the GUI and likely want to set
# the following cron options to "no".

# Cron job will install updates automatically
autoinstall = no

# Cron job will print a message when new updates are installed.
# This option is only relevant if autoinstall = yes
cron_output_install = no

# Cron job will print a message when new updates are available
cron_output_available = no

# Cron job will print a message when it encounters errors
cron_output_error = no
</pre>
<p>Insert your access key. Please use the same access key for all of your systems. If you would like Uptrack to automatically install rebootless kernel updates as they become available, set autoinstall = yes.</p>
<p>When you are done with your Uptrack configuration, please run the following command as root to bring your kernel up to date:</p>
<pre>
uptrack-upgrade -y
</pre>
<g:plusone href="https://lifelinux.com/how-to-install-ksplice-on-centos-redhat/" size="standard"  annotation="none"   ></g:plusone><p>The post <a rel="nofollow" href="https://lifelinux.com/how-to-install-ksplice-on-centos-redhat/">How To Install Ksplice on CentOS / RedHat</a> appeared first on <a rel="nofollow" href="https://lifelinux.com">lifeLinux: Linux Tips, Hacks, Tutorials, Ebooks</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://lifelinux.com/how-to-install-ksplice-on-centos-redhat/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How To Update Linux Kernel With Ksplice Uptrack</title>
		<link>https://lifelinux.com/how-to-update-linux-kernel-with-ksplice-uptrack/</link>
					<comments>https://lifelinux.com/how-to-update-linux-kernel-with-ksplice-uptrack/#respond</comments>
		
		<dc:creator><![CDATA[lifeLinux]]></dc:creator>
		<pubDate>Thu, 12 May 2011 01:21:43 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Sys Admin]]></category>
		<category><![CDATA[Fedora kernel hot patching]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[kernel hot patching]]></category>
		<category><![CDATA[kernel updates]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Linux kernel hot patching]]></category>
		<category><![CDATA[linux-distributions]]></category>
		<category><![CDATA[network proxy]]></category>
		<category><![CDATA[OpenSuse kernel hot patching]]></category>
		<category><![CDATA[patching]]></category>
		<category><![CDATA[proxy setting]]></category>
		<category><![CDATA[reboot]]></category>
		<category><![CDATA[Redhat kernel hot patching]]></category>
		<category><![CDATA[RHEL kernel hot patching]]></category>
		<category><![CDATA[rpm]]></category>
		<category><![CDATA[security updates]]></category>
		<category><![CDATA[servers]]></category>
		<category><![CDATA[Slackware kernel hot patching]]></category>
		<category><![CDATA[Suse kernel hot patching]]></category>
		<category><![CDATA[Ubuntu kernel hot patching]]></category>
		<category><![CDATA[upgrades]]></category>
		<category><![CDATA[uptime]]></category>
		<category><![CDATA[yum]]></category>
		<guid isPermaLink="false">http://www.lifelinux.com/?p=442</guid>

					<description><![CDATA[<p>What is Ksplice Uptrack? Ksplice Uptrack is a subscription service that lets you apply 100% of the important kernel security updates released by your Linux vendor without rebooting. Update Linux Kernel With Ksplice Uptrack Ksplice updates are the same security and bugfix updates you would get from your Linux vendor, packaged in a special rebootless [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://lifelinux.com/how-to-update-linux-kernel-with-ksplice-uptrack/">How To Update Linux Kernel With Ksplice Uptrack</a> appeared first on <a rel="nofollow" href="https://lifelinux.com">lifeLinux: Linux Tips, Hacks, Tutorials, Ebooks</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p></p><h3>What is Ksplice Uptrack?</h3>
<p><strong>Ksplice Uptrack</strong> is a subscription service that lets you apply 100% of the important kernel security updates released by your Linux vendor without rebooting.<span id="more-442"></span></p>
<h3>Update Linux Kernel With Ksplice Uptrack</h3>
<p><strong>Ksplice</strong> updates are the same security and bugfix updates you would get from your Linux vendor, packaged in a special rebootless form. Type the following to apply updates (note it may take a few hours to get ksplice update as they upgrade their system after RHN releases kernel upgrades):</p>
<pre>
[root@lifelinux ~]# uptrack-upgrade
</pre>
<g:plusone href="https://lifelinux.com/how-to-update-linux-kernel-with-ksplice-uptrack/" size="standard"  annotation="none"   ></g:plusone><p>The post <a rel="nofollow" href="https://lifelinux.com/how-to-update-linux-kernel-with-ksplice-uptrack/">How To Update Linux Kernel With Ksplice Uptrack</a> appeared first on <a rel="nofollow" href="https://lifelinux.com">lifeLinux: Linux Tips, Hacks, Tutorials, Ebooks</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://lifelinux.com/how-to-update-linux-kernel-with-ksplice-uptrack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
