Exceptionally reliable and easy to use, SME Server can be installed and configured in less than 20 minutes – yet it’s powered by a secure and open Linux platform that’s fully upgradeable and customizable. Simply install it on any standard PC and in minutes you’ll have a robust Linux-based LAMP server capable of fully replacing those expensive Windows server licenses and providing a full range of services – including e-mail, firewall, file and print-sharing, web hosting, remote access and more.
We firmly believe that Oracle Linux is the best Linux distribution on the market today. It’s reliable, it’s affordable, it’s 100% compatible with your existing applications, and it gives you access to some of the most cutting-edge innovations in Linux like Ksplice and dtrace.
Hmmm. We’ll see about that.
- How is this better than CentOS?
Well, for one, you’re getting the exact same bits our paying enterprise customers are getting. So that means a few things. Importantly, it means virtually no delay between when Red Hat releases a kernel and when Oracle Linux does:
You’re on a 64-bit system, and don’t have 32-bit library support installed.
sudo yum install glibc.i686
Also had to yum install gtk2.i686. Here’s the solution from the above link for Debian based systems:
Updated: Since it seems this answer is still getting viewed, and occassionally up-voted, note that the solution above works on CentOS, Fedora, or Red Hat derived operating systems; on a Debian or Ubuntu derived system, however, one would instead use
sudo apt-get install ia32-lib
For some reason, after all these years of using 64 bit OSs, and still having an active, running FC10 installation, this was the first time I had no choice but to run a 32-bit app on a 64 bit machine.
The above solution worked
rpm -Uvh http://download.fedora.redhat.com/pub/epel/5/i386/epel-release-5-4.noarch.rpm
This link works as of this date. There are a lot of bad links floating around out there in the google.
If you have downloaded, created, or rebuilt RPM packages locally (as explained in TipsAndTricks/YumAndRPM “Get set up for rebuilding packages while not being root”) you may want a place to put them so they are accessible from all the machines on your local net.
This didn’t work the first time I tried it and now it does. For some reason eth0 and eth1 get switched on the 64bit CentOS 5.7 build which causes routing problems. This can also be solved by fixing the static routes in /etc/rc.local. It bothered me to have these interfaces have different names depending on what OS is running. I think there’s also a way to force this in /etc/udev/ directory by adding a persistent-net rule file. It all works now.
BTW: I also changed /etc/sysconfig/hwconf but don’t think that had any effect.
I’m finding that more and more software developers are being quite inconsiderate and are making code that requires PHP 5.3. Since many server-based and long-term support distros are still on PHP 5.2, this can make things difficult quickly.
Here here! I needed to do the following on CentOS 5.7:
#sudo yum erase php
#sudo yum erase php-commons
#sudo yum install php53
#sudo yum install php53-mysql
The default RPMforge repository does not replace any CentOS base packages. In the past it used to, but those packages are now in a separate repository (rpmforge-extras) which is disabled by default.
You can find a complete listing of the RPMforge package packages at http://packages.sw.be/
The rpm at this link allows for yum to see the additional packages — such as alpine and perhaps others that were missing in the base.
For our particular server, several spikes immediately raise suspicions: 15 February and 19 July, when new versions of OpenSSH were installed; 20 October, when the server cleanup took place. Additionally, we found spikes on 10 February and 3 April, when certain events took place. We were able to identify “dovecot” crashes on these dates, although we can’t be sure they were caused by the attackers (“dovecot” remote exploit?) or simply instabilities.
Of course, for server ‘A’, three big questions remain:
- How did the attackers get access to this computer in the first place?
- What exactly was its purpose and how was it (ab-)used?
- Why did the attackers replace the stock OpenSSH 4.3 with version 5.8?
Interesting read. Apparently there might have been a zero day exploit in openssh.
Duqu is a computer worm discovered on 1 September 2011, thought to be related to the Stuxnet worm. The Laboratory of Cryptography and System Security (CrySyS) of the Budapest University of Technology and Economics in Hungary, which discovered the threat, analyzed the malware and wrote a 60-page report, naming the threat Duqu. Duqu got its name from the prefix “~DQ” it gives to the names of files it creates.
Here‘s an interesting comment on slashdot.
For the impatient, here is our simple script. We’ll explain it afterwards. This is assuming that you’re on a 192.168.1.0/24 network with no DHCP server.
sudo brctl addbr br0
sudo ifconfig eth0 0.0.0.0
sudo brctl addif br0 eth0
sudo ifconfig br0 192.168.1.120 netmask 255.255.255.0 up
sudo route add -net 192.168.1.0 netmask 255.255.255.0 br0
sudo route add default gw 192.168.1.1 br0
sudo tunctl -b -u john
sudo ifconfig tap0 up
sudo brctl addif br0 tap0
sudo iptables -I RH-Firewall-1-INPUT -i br0 -j ACCEPT
qemu-kvm ~/win2k.img -m 512 -net nic -net tap,ifname=tap0,script=no