Language Selection

English French German Italian Portuguese Spanish

Network Diagnostic Tool (NDT) On Ubuntu 7.10 Server

Filed under
Ubuntu
HowTos

This guide will walk you through the setup process for implementing NDT running under Ubuntu 7.10 Server. For those unfamiliar with NDT, it is a network performance testing application. NDT will measure the throughput between your server and the desktops that you run the java client from.

http://www.howtoforge.com/network-diagnostic-tool-ndt-ubuntu-7.10-server

More in Tux Machines

Android Leftovers

Leftovers: OSS

GNU/FSF

  • The state of Federation
    It’s been a long time since there has been any news on the state of federation, so here’s an update on where Mediagoblin’s at and some technical aspects of federation. We’ve been working with the W3C Social Working Group to define the future of federation, and part of my work there has been to work on the ActivityPump standard. There’s more to say on that and why we’re investing time there, but this blogpost will mostly be about MediaGoblin and federation from a technical perspective.
  • Who actually reads the code?
    I am the maintainer of a piece of free software called GNU Parallel. Free software guarantees you access to the source code, but I have been wondering how many actually read the source code. To test this I put in a comment telling people to email me when they read this. The comment was put in a section of the code that no one would look to fix or improve the software -- so, the source code equivalent to a dusty corner. To make sure the comment would not show up if some one just grepped through the source code I rot13'ed the source code.
  • Who Reads the Source Code Anyway?
    Today's new feeds were just chock full 'o interesting articles. The first up came from Ole Tange who set up a little experiment to see how long it took for someone to read his source code. Bryan Quigley commented on "The Mozilla We've Got" and OpenSource.com interviewed Linus Torvalds' daughter, who is building a career in computer science and engineering. Elsewhere, Brook Kidane reviewed Point Linux 3.0 and Laurent Montel ran down KDEPIM 5.0.

Security Leftovers

  • Hacktivists congratulate Daily Show's Jon Stewart via Donald Trump's website
    Canadian hacktivists Telecomix Canada have defaced Donald Trump's website. The message, entitled "Your Moment of Zen, Mr Stewart" is a shoutout to Jon Stewart of the Daily Show for his steady criticism of Donald Trump. The announcement was made by Telecomix Canada on pastebin and says that the reveal of the server penetration is in honour of the last week of Stewart's tenure helming the Daily Show on Comedy Central.
  • Macs can be remotely infected with firmware malware that remains after reformatting
    When companies claim their products are unhackable or invulnerable, it must be like waving a red flag in front of bulls as it practically dares security researchers to prove otherwise. Apple previously claimed that Macs were not vulnerable to the same firmware flaws that could backdoor PCs, so researchers proved they could remotely infect Macs with a firmware worm that is so tough to detect and to get rid of that they suggested it presents a toss your Mac in the trash situation.
  • More malware turns up on Macs
    As we head into the middle of the week more news will be coming out surrounding the Black Hat hacker conference which takes places on the 5th and 6th this week. A talk that will be given by Trammell Hudson, Xeno Kovah and Cory Kallenberg is set to show a flaw in the firmware of Mac computers which can be remotely targeted.
  • The World's First Firmware Worm for Mac Is Here, and It Sounds Scary
  • 0-day bug in fully patched OS X comes under active exploit to hijack Macs
    Hackers are exploiting a serious zero-day vulnerability in the latest version of Apple's OS X so they can perform drive-by attacks that install malware without requiring victims to enter system passwords, researchers said.
  • Hackers are exploiting an OS X flaw to install unwanted adware
  • Apple stock implosion shreds $113.4B
    Apple (AAPL) shares are down significantly for the second day Tuesday — bringing investors' paper losses to staggering levels and putting the stock further into correction territory.
  • From Car-Jacking To Car-Hacking: How Vehicles Became Targets For Cybercriminals
    The morning after Laura Capehorn parked her Saab 9-3 estate, all she could find of it was a car-shaped hole in the snow. The interior designer had left the vehicle outside her mother-in-law's house in Shepherd's Bush, London, one evening in January 2014. By the morning it was gone, presumed stolen. Police immediately asked to see the car's key, and weren't surprised to find out it was an electronic fob. They had seen an increase in tech-savvy criminals using a key-cloning system to gain entry to high-value vehicles. Once in, the thieves drive away within seconds.
  • WordPress 4.2.4 Security and Maintenance Release
    WordPress 4.2.4 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately.
  • Six Vulnerabilities Patched With Release of WordPress 4.2.4
    The developers of the WordPress content management system (CMS) today announced the release of version 4.2.4. This security release addresses six vulnerabilities and four bugs. According to the release notes, WordPress 4.2.4 patches three cross-site scripting (XSS) flaws and a SQL injection vulnerability that can be exploited to compromise websites. The latest version also protects users against a potential timing side-channel attack, and prevents attackers from locking posts from being edited. Marc-Alexandre Montpas of Sucuri, Helen Hou-Sandí of the WordPress security team, Netanel Rubin of Check Point, Ivan Grigorov, Johannes Schmitt of Scrutinizer, and Mohamed A. Baset have been credited for reporting these vulnerabilities. WordPress has noted that these fixes are also included in WordPress 4.3 RC2. Check Point has published a brief advisory for the SQL injection vulnerability (CVE-2015-2213) patched in the latest version of WordPress. According to the security firm, this is a critical flaw affecting WordPress 4.2.3 and prior.