Language Selection

English French German Italian Portuguese Spanish

Linux Server Tournament, part 2

Filed under
Linux

Last time, we discussed which distros were going to be used in this setup.

Our nominees are BEL Server Basic (KDE), UServer 8.04 LTS, OpenSuse 11 and CentOS 5.

Situationally, we talked about what we felt were the 'keypoint' strengths' of each distro and what role we would fit them into the LAN as.

This is a small LAN, one of the purposes of using Linux as a server for our intents is to provide small/medium sized businesses an option that makes the most out of available resources. Which often means using equipment at hand or easily (low cost) gotten.

Each machine we will use will have no less than 512 MB of RAM and 120 GB hard drive. These are all p4/athlon equivalents and are very common in the field.

BEL Server Basic will be implemented as our webserver.

CentOS will take on mail server functions.

Ubuntu Server will handle authentication, including LDAP, DNS and related.

OpenSuse will handle file/print services.

All connections to the LAN will be wired, ethernet. There will be common switches used (Linksys, that sort).

There will be some non-free apps used, and HP printers as well, requiring HPLIP.

All the servers will be secured using what is currently offered on disk, as shipped, be it Bastille, SELinux, AppArmor, etc...

There has been a slight delay in acquiring the machines and space to put together this project, but it should be soon now things are coming back together.

We would like to hear from readers about their experiences implementing these distros in similar fashion, whether it be in the same server configuration or other.

More in Tux Machines

Security: Twitter and Facebook

  • Twitter banned Kaspersky Lab from advertising in Jan
     

    Twitter has banned advertising from Russian security vendor Kaspersky Lab since January, the head of the firm, Eugene Kaspersky, has disclosed.  

  • When you go to a security conference, and its mobile app leaks your data
     

    A mobile application built by a third party for the RSA security conference in San Francisco this week was found to have a few security issues of its own—including hard-coded security keys and passwords that allowed a researcher to extract the conference's attendee list. The conference organizers acknowledged the vulnerability on Twitter, but they say that only the first and last names of 114 attendees were exposed.

  • The Security Risks of Logging in With Facebook
     

    In a yet-to-be peer-reviewed study published on Freedom To Tinker, a site hosted by Princeton's Center for Information Technology Policy, three researchers document how third-party tracking scripts have the capability to scoop up information from Facebook's login API without users knowing. The tracking scripts documented by Steven Englehardt, Gunes Acar, and Arvind Narayanan represent a small slice of the invisible tracking ecosystem that follows users around the web largely without their knowledge.

  • Facebook Login data hijacked by hidden JavaScript trackers
     

    If you login to websites through Facebook, we've got some bad news: hidden trackers can suck up more of your data than you'd intended to give away, potentially opening it up to abuse.

Beginner Friendly Gentoo Based Sabayon Linux Has a New Release

The team behind Sabayon Linux had issued a new release. Let’s take a quick look at what’s involved in this new release. Read more

Android Leftovers

Linux Foundation Leftovers

  • Cloud Foundry eyes China’s market with Alibaba Cloud’s membership
    Alibaba Cloud announced it is deploying Cloud Foundry on its infrastructure alongside joining the Cloud Foundry Foundation as a gold member.
  • Cloud Foundry Remains Committed, Cautious on Kubernetes
    The Cloud Foundry Foundation continues to garner strong support from the developer community. But the ongoing surge in interest around the use of Kubernetes to exploit containers for cloud deployments has placed a focus on how the Cloud Foundry Foundation will evolve. The topic of Kubernetes integration with Cloud Foundry was part of several sessions and keynote addresses at this week’s Cloud Foundry Summit. While the organization has tangentially begun to integrate the container orchestrator into its work, it remains cautious on a stronger embrace.
  • Kubernetes and Cloud Foundry grow closer
    Containers are eating the software world — and Kubernetes is the king of containers. So if you are working on any major software project, especially in the enterprise, you will run into it sooner or later. Cloud Foundry, which hosted its semi-annual developer conference in Boston this week, is an interesting example for this.
  • Cloud Foundry PaaS shops hone software delivery process
    Enterprises that have deployed Cloud Foundry platform as a service found it catalyzed new thinking about the application delivery process and other organizational practices.
  • Hyperledger bug bounty program goes public
    Hyperledger is an open-source project and hub for developers to work on blockchain technologies. The Hyperledger infrastructure is being developed in order to support cross-industry uses of distributed ledger technologies, most commonly associated with the exchange of cryptocurrency. [...] Over the past year, Hyperledger has formalized how blockchain projects can move from development to their first 1.0 release. This process now includes a number of security requirements, including meeting the demands of the Core Infrastructure Initiative (CII), which sets "best practice" requirements for open-source project security. In addition, up to three members of a project must be nominated to the Hyperledger security team to help triage and resolve vulnerabilities.
  • iconectiv Brings Device ID Expertise to the Linux Foundation
    The Bridgewater, New Jersey-based company iconectiv this week joined the Linux Foundation Networking Fund. iconectiv is perhaps most well-known as a Local Number Portability Administrator (LNPA). In this role the company handles the administrative work to enable people to port their phone numbers between different service providers. It operates as the LNPA for the majority of countries in the world. It was named as the LNPA for the United States in 2016, taking over the role from Neustar.