Monthly Archives: January 2015

The System Defense Stack

Rationale I have scoured the Internet far and wide and found nothing similar to what is in my head regarding this topic, so I thought I’d provide the above as my conceptual map for system defense (not incident detection and … Continue reading

Posted in Information Technology | Tagged | Leave a comment

CVE-2015-0235: “GHOST” Vulnerability Analysis

Attack Vectors If I’m reading this report correctly, the only viable attack vector against an otherwise uncompromised system is through software which grants access to some means by which an attacker can supply a string and cause the software to … Continue reading

Posted in Information Technology | Tagged , | Leave a comment

LFCE Preparation Guide: Network Administration – Routing IP Traffic Statically and Dynamically

Introduction This is another very robust, non-trivial competency listed for the LFCE examination.  I’m glad it’s included, actually, because networking is a very poorly-understood field among many IT professionals serving as system administrators or, worse, system engineers and beyond.  I … Continue reading

Posted in Academics, Information Technology | Tagged , , | 4 Comments

LFCE Preparation Guide: Network Administration – Producing and delivering reports on system use, outages, and user requests

Introduction Again, the scope of this competency has been difficult for me to determine.  The only other seemingly-reputable LFCE guide on the Internet (TecMint) hasn’t yet published its post on this subject, and as with the previous post (Monitoring Network … Continue reading

Posted in Academics, Information Technology | Tagged , , , , , | 1 Comment

LFCE Preparation Guide: Network Administration – Monitoring Network Performance

Introduction The scope of this competency has been difficult for me to determine.  The only other seemingly-reputable LFCE guide on the Internet (TecMint) hasn’t yet published its post on this subject, and I’m very interested to see how they handle … Continue reading

Posted in Academics, Information Technology | Tagged , , , , , , | Leave a comment

LFCE Preparation Guide: Network Administration – Implementing Packet Filtering

Introduction By “packet filtering,” the Linux Foundation here appears to be referring to iptables in the CentOS environment.  While iptables is still usable on RHEL/CentOS 7, it is by default replaced by firewalld (part of the systemd software suite), which … Continue reading

Posted in Academics, Information Technology | Tagged , , , , | Leave a comment

Multiseat Configuration in Fedora 21

This is really cool, so I thought I’d share.  I came across a query regarding the possibility of setting up multiple simultaneous users with their own keyboards, mice, and monitors (and whatever else) on the same system.  It seems like … Continue reading

Posted in Information Technology | Tagged , | 12 Comments