90% of the world's most powerful supercomputers using an operating system GNU / Linux, in fact, the top ten of supercomputers use Linux. In fact, the penetration of Linux in data centers is very high, 33.8% of the world runs on Linux servers compared to 7.3% does so in a Microsoft operating system. For example, Google's servers run on Linux, like the server hosting the website of the White House.
Linux Earlier Years
The first commercial distribution GNU / Linux was Yggdrasil was launched Lice-CD format in 1992. Red Hat was one of the first distributions to settle within companies and data centers in 1999. Debian was one of the first GNU / Linux that was constituted and organized as a community of developers.
Linux OS used in Major Applications / Services
Linux is present in highly critical applications such as Japan's bullet trains, traffic control, San Francisco, the New York Stock Exchange, CERN, many air traffic control systems or control of nuclear reactors of submarines and ships many nuclear war.
Expanding Everyday
Linux has more than 9.2 million lines of code and this amount grows 10% each year. Of the 9.2 million lines, the kernel itself accounts for 5% and 55% drivers. Add lines 4500, 1800 and 1500 are removed are changed every day.
Widely Used
Linux is now one of the most widely ported operating system kernels, running on a diverse range of systems from handheld computers to mainframe servers.
A solid-state drive (SSD) (sometimes improperly referred to as a "solid-state disk" or "electronic disk") is a data storage device that uses integrated circuit assemblies as memory to store data persistently. SSD technology uses electronic interfaces compatible with traditional block input/output (I/O) hard disk drives. SSDs do not employ any moving mechanical components, which distinguishes them from traditional magnetic disks such as hard disk drives (HDDs) or floppy disks, which are electromechanical devices containing spinning disks and movable read/write heads.
Samsung Galaxy SII and SIII smartphones might be at a huge security risk
when opening links with QR technology, NFC or push notifications,
according to a new report.
ZDNet is reporting that Samsung devices with TouchWiz’s user interface
for Android could find their smartphones to be completely wiped clean
when exposed to a malicious code embedded on a webpage.
SEE ALSO: Facebook Users Say Private Messages Appear Publicly
Security researcher Ravi Borgaonkar demonstrated at a security
conference last week in Argentina the weaknesses built into Samsung’s
Unstructured Supplementary Service Data (USSD), which allows message
communication to go from the phone to the application server. Samsung’s
TouchWiz communicates with USSD and appears to be affected, he said.
Borgaonkar demoed how a hacker could take advantage of the vulnerability
and attack a user who accesses on a bad link. Hackers can then remotely
wipe the handset and SIM card in just a few minutes, and re-set the
device to factory mode. This happens because of malicious code embedded
within a website.
It’s important to understand that simply visiting a website with this
malicious code from your mobile device won’t trigger the potential
attack. Instead, users must access the site from a QR code, SMS, NFC or
WAP message.
Samsung has not yet responded to a request for comment. For a full look at Borgaonkar’s presentation, check out the video below.
The one big advantage with Google Docs is that it can be configured to check your website status every minute and thus you’ll instantly know if your site is down. And it’s free.
The Google Docs sheet will monitor your website in the background at all times and will send an email alert whenever it has trouble accessing the website. If the issue is resolved, you’ll get another notification saying “all’s well.” If you are a tech genius you can also make a twitter account to alert you which will enable you to monitor the downtime history.
If you want to configure this for your server you can do it in 4 easy steps.
You can find the steps here.
Maldet is a security software usually used in linux to scan for vulnarabilities or malware check. To install maldet follow the steps below:
cd /usr/local/src/
rm -vrf maldetect-*
wget http://www.rfxn.com/downloads/maldetect-current.tar.gz
tar -xzf maldetect-current.tar.gz
cd maldetect-*
sh ./install.sh
maldet --update-ver
maldet --update
You may also want to consider activating the many features of maldet, for example: