Instalando e utilizando o Zimbra - Dicas: "Instalando e utilizando o Zimbra
O Zimbra, é uma suite colaborativa de e-mail muito poderosa, cujo foco é ser uma alternativa livre ao Microsoft Exchange. Com suas duas versões disponíveis, a versão Network Edition (NE) e a Open Source, ele consegue, no mínimo equiparar-se a solução oferecida pela Microsoft, tendo a sua versão NE voltada a empresas que precisam de suporte e ferramentas de backup mais avançadas.
"
quarta-feira, 25 de agosto de 2010
Linux: Utilizando chaves públicas no SSH e SCP [Dica]
Linux: Utilizando chaves públicas no SSH e SCP [Dica]:
"Transferir arquivos entre computadores utilizando ssh e scp é uma funcionalidade bastante útil em certos momentos. Porém essa transferência requer uma autenticação usualmente feita através de senha, isso impossibilita que a transferência de arquivos entre hosts possa ser feita automaticamente, sem intervenções.
Para evitar a requisição de senhas nas transferências ou mesmo nas sessões ssh, é possível gerar chaves públicas de acesso e criptografar os dados de maneira direta. São geradas duas chaves: uma pública que ficará nos hosts que aceitarão o arquivo e uma privada, que pertencerá apenas ao host que envia. Dessa forma sempre que requisitar uma conexão ssh ou uma transferência scp entre os hosts que possuem as chaves, não será necessário digitar a senha.
Essa operação deve ser utilizada com cuidado, pois gera uma alta confiança entre os dois computadores envolvidos. E se a chave pública for compartilhada com outros hosts, ao comprometer a chave privada, automaticamente todos os outros também estarão vulneráveis."
"Transferir arquivos entre computadores utilizando ssh e scp é uma funcionalidade bastante útil em certos momentos. Porém essa transferência requer uma autenticação usualmente feita através de senha, isso impossibilita que a transferência de arquivos entre hosts possa ser feita automaticamente, sem intervenções.
Para evitar a requisição de senhas nas transferências ou mesmo nas sessões ssh, é possível gerar chaves públicas de acesso e criptografar os dados de maneira direta. São geradas duas chaves: uma pública que ficará nos hosts que aceitarão o arquivo e uma privada, que pertencerá apenas ao host que envia. Dessa forma sempre que requisitar uma conexão ssh ou uma transferência scp entre os hosts que possuem as chaves, não será necessário digitar a senha.
Essa operação deve ser utilizada com cuidado, pois gera uma alta confiança entre os dois computadores envolvidos. E se a chave pública for compartilhada com outros hosts, ao comprometer a chave privada, automaticamente todos os outros também estarão vulneráveis."
CSR Generation - Official Red Hat Linux Apache/SSL Server
CSR Generation - Official Red Hat Linux Apache/SSL Server:
"Certificate Signing Request (CSR) Generation - Official Red Hat Linux Apache/SSL Server
The process of creating a key and a CSR is easy and should only take a few minutes. Please note that the correct commands will depend upon whether you own the Official Red Hat Linux Professional boxed set or the Official Red Hat Linux Professional, International Edition, boxed set.
"
"Certificate Signing Request (CSR) Generation - Official Red Hat Linux Apache/SSL Server
The process of creating a key and a CSR is easy and should only take a few minutes. Please note that the correct commands will depend upon whether you own the Official Red Hat Linux Professional boxed set or the Official Red Hat Linux Professional, International Edition, boxed set.
"
CSR Decoder - Check CSR to verify its contents
CSR Decoder - Check CSR to verify its contents:
"CSR Decoder
Use this CSR Decoder to decode your Certificate Signing Request and and verify that it contains the correct information. A Certificate Signing Request is a block of encoded text that contains information about the company that an SSL certificate will be issued to and the SSL public key. Once a CSR is created it is difficult to verify what information is contained in it because it is encoded.
"
"CSR Decoder
Use this CSR Decoder to decode your Certificate Signing Request and and verify that it contains the correct information. A Certificate Signing Request is a block of encoded text that contains information about the company that an SSL certificate will be issued to and the SSL public key. Once a CSR is created it is difficult to verify what information is contained in it because it is encoded.
"
quinta-feira, 12 de agosto de 2010
Office 2010 activation – How to rearm Office 2010 - 4sysops
Office 2010 activation – How to rearm Office 2010 - 4sysops
To rearm Office 2010, you only have to run ospprearm.exe in %installdir%\%Program Files%\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform from an elevated command prompt. “%Program Files%” has to be replaced with %Program Files (x86)% if you installed Office 2010 32-bit on Windows 64-bit.
To rearm Office 2010, you only have to run ospprearm.exe in %installdir%\%Program Files%\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform from an elevated command prompt. “%Program Files%” has to be replaced with %Program Files (x86)% if you installed Office 2010 32-bit on Windows 64-bit.
terça-feira, 10 de agosto de 2010
Adicionando um novo disco a um volume LVM2 online | Fogo na Caixa dAgua
Adicionando um novo disco a um volume LVM2 online | Fogo na Caixa dAgua: "Adicionando um novo disco a um volume LVM2 online
"
"
segunda-feira, 2 de agosto de 2010
ESXTOP » Yellow Bricks
ESXTOP » Yellow Bricks: "ESXTOP
I am a huge fan of esxtop! I read a couple of pages of the esxtop bible every day before I go to bed. Something I however am always struggling with is the “thresholds” of specific metrics. I fully understand that it is not black/white, performance is the perception of a user in the end.
There must be a certain threshold however. For instance it must be safe to say that when %RDY constantly exceeds the value of 20 it is very likely that the VM responds sluggish. I want to use this article to “define” these thresholds, but I need your help. There are many people reading these articles, together we must know at least a dozen metrics lets collect and document them with possible causes if known.
Please keep in mind that these should only be used as a guideline when doing performance troubleshooting! Also be aware that some metrics are not part of the default view, I’ve added the character you need to add to the default view for your convenience. You can add fields to an esxtop view by clicking “f” on followed by the corresponding character.
I used VMworld presentations, VMware whitepapers, VMware documentation, VMTN Topics and of course my own experience as a source and these are the metrics and thresholds I came up with so far. Please comment and help build the main source for esxtop thresholds."
I am a huge fan of esxtop! I read a couple of pages of the esxtop bible every day before I go to bed. Something I however am always struggling with is the “thresholds” of specific metrics. I fully understand that it is not black/white, performance is the perception of a user in the end.
There must be a certain threshold however. For instance it must be safe to say that when %RDY constantly exceeds the value of 20 it is very likely that the VM responds sluggish. I want to use this article to “define” these thresholds, but I need your help. There are many people reading these articles, together we must know at least a dozen metrics lets collect and document them with possible causes if known.
Please keep in mind that these should only be used as a guideline when doing performance troubleshooting! Also be aware that some metrics are not part of the default view, I’ve added the character you need to add to the default view for your convenience. You can add fields to an esxtop view by clicking “f” on followed by the corresponding character.
I used VMworld presentations, VMware whitepapers, VMware documentation, VMTN Topics and of course my own experience as a source and these are the metrics and thresholds I came up with so far. Please comment and help build the main source for esxtop thresholds."
Assinar:
Postagens (Atom)