My PiWall

Linux Raspberry Pi Technical

If you have not heard of the Raspberry Pi yet – or just Pi or rPi for short – you really should learn about it. Soon!

Kids learning computers

The Raspberry Pi is a very small computer that was designed to help children learn about computers and how they work. Although it can be used as a platform for kids to learn programming skills, it can also be used to learn about robotics, remote sensing, and almost anything a computer can be used for. Because of its low price and small form factor, the Pi is also extending the ways in which computers are being used.

Raspberry Pi Model 3B

Raspberry Pi Model 3B

One of the amazing things about the Pi is its $35US price tag. Of course by the time you add a small case,, keyboard, mouse, and display, the cost is a bit more, but $35 is very low for just the computer itself. This provides access to computers for low-income students and the schools they attend in a way never before possible.

Grown-up uses

But the Raspberry Pi can be used for much more than that. Many of us hackers have found important real-world uses for our Pi computers.

I personally have two Raspberry Pi’s performing firewall duties for my network. These Pi’s replace two much larger and more expensive computers that used to perform the same functions. They do this easily and quietly, running day after day to protect my network. And sometimes I have hundreds of individual attacks on my network in a single day so it is an important function.

You can read the details of how I set up my Raspberry Pi firewall at Opensource.com.

Cluster Failures

Information Ruminations

No, “cluster failures” is not a euphemism for a problem encountered in the military service and widely known to be caused by officers with clusters on their shoulders. Nor does this page relate to failures of computing clusters.

This is about failures of independent computer systems and other devices that occur very close together in time. In some cases, the failures may also be of similar type such as a series hard drive or motherboard failures.

And recently I really have had a cluster of problems, some with computers and some not. Actually a cluster of clusters.

I have been repairing things for about sixty years. I started with TV’s, ours and our friends’ and neighbors’. Then I worked at a couple now defunct audio stores. I went on to fixing unit record equipment and computers for IBM. And when personal computers started hitting the streets, I started fixing those as well, both hardware and software.

Cluster failures are a real thing. When working at the audio stores, there would be days or weeks when the most common things people brought in for repair were receivers. And they were frequently similar failures such as the power output stage, or the IF stage. Other days it would be turntables with broken belts or component tuners that would not tune.

When I worked for IBM, there was one week when I fixed three punched card readers with nearly identical feed failures. And later, when working at the IBM PC National Support Center, there were days when most of the calls I fielded were memory (RAM) problems.

Sure, randomness abounds in the universe, including the failures of electronic and electromechanical devices. But sometimes that randomness expresses itself in clusters of failures.

The Church Cluster

It all began on Wednesday, September 9, when the server at my church began failing; really crashing hard. The computer we use as a firewall was also failing with intermittent crashes. In addition, one of the office computers froze up and the telephone system began failing.

It took a couple days for this to this play out and repair the computers. I don’t do the phone system, someone else does that.

The server, a donated Dell, was clearly having hard drive problems. There were specific errors on the console pointing to one of the hard drives. Murphy rules and there were no errors recorded in the logs, because the failing hard drive was where the logs were kept. So because I was not on site and the errors were displayed on the console, the person who rebooted for me could not read the errors as the display had timed out into power saving mode and pressing keys on the keyboard did not wake it.

In addition, the computer we use for a firewall was locked up so I rebooted it.

I took the server home to rebuild and by the next day had mostly completed that task, but not without discovering serious hardware issues. One of the hard drives had failed catastrophically. That was easy enough to fix. But in attempting to install a new operating system on the replacement hard drive, it became obvious that there were other problems as well. The motherboard was failing as well and it was impossible to boot or even to get through the BIOS POST. So I installed the spare Dell motherboard we kept on hand for just this event, and was able to proceed.

I was able to restore the data for our web site and email servers from the good and well-tested backups I designed. I was also able to restore the data for  the DHCP and name service (BIND) servers.

However, soon after I returned home with the server that I needed to rebuild, a different computer, the firewall began locking up more frequently. The office staff were still able to get out to the Internet so long as that firewall was working, but our web site and email was down because that is all housed on our server. Without the firewall, all external access was gone.

The next day, Thursday, I returned to the church and installed the rebuilt server, which worked fine.

However, after installing the server, the firewall started failing so frequently that I could not leave the premises before it would do so again. I made a quick trip back home to obtain a spare computer that had been given to me and had been used as a firewall itself. I installed it at the church, made a couple simple configuration changes, and the replacement firewall was up and running.

The Home Cluster

While all of that was going on at the church, my home network was also embroiled in a cluster of problems.

First, my own server started failing. One of the four 1GB memory DIMMs had failed. One of my workstations had a motherboard failure, and another system developed a defective power supply. A fan then failed on my server, and a video adapter failed on a different workstation. And, oh yes, a hard drive failed on my own workstation. And then a hard drive failed on my server.

And don’t get me started on my refrigerator and car.

What’s it all about, Alfie?

All of this took place within the space of a week, both at church and home. So it was a very trying week.

But what does it mean?

Well, as much as we like to assign meaning to things, there really is none. Things fail. Most of the time they work for years without a problem. Sometimes the failures are spread out evenly over time, or suddenly many things seem to fail at once.

So, sometimes when you get something fixed one day and it fails with another problem the next, that is just the randomness of the universe in which we live.

And now, weeks after the events described, all is well with the computers at church, at home, with my computers, car and fridge — until the next time.

Disk errors – server migration in progress

Notifications Site Outage

Due to an accumulation of hard drive errors on this web and email server I am preparing a new server to take over from this one.

Over the past couple weeks, the SMART function of the hard drive installed on the server has been reporting steadily larger numbers of permanently unreadable disk sectors. So far this has caused a couple minor software crashes that did not take down the whole server, just one or two of the running server functions.

So in the interest of a smooth transition, I have started work on a new server by installing CentOS 6 on a computer I had doing some minor functions that were fun but not necessary. I will be migrating server functions from the old server to the new over the next couple weeks. I do expect there to be some very short periods of down time, but none should last more than a few minutes.

If you encounter difficulty with accessing my web sites or sending me email. please be patient and try again in a few minutes.

Thanks for your patience.

A Quick Look at Fedora 23

KDE Linux Opinion

This is only the second day of the general availability of Fedora 23, so this is not a full-on review. It is just a quick look at what I have experienced so far.

I was so excited to try Fedora 23 that I broke my own rules and installed it directly on my primary workstation without so much as a test in a VM.

Upgrade

Yes, I was able to upgrade from Fedora 21 to Fedora 23. I have not had a successful upgrade in years and have had to resort to complete reinstallations — while saving home directory data, of course. The old fedup program never worked for me.

The network-based dnf system upgrade procedures worked very well with only one minor glitch.

I installed the dnf upgrade plugin, used the dnf system-upgrade download command to download the packages required to perform the upgrade on my system, and then rebooted to perform the upgrade.

The only problem I had was that the download procedure did not download or install the Fedora 23 public signing key. I installed that manually and the rest of the procedure worked just fine.

All in all, it took a little under 3 hours to perform the upgrade, in large part because I have a lot of things installed for testing purposes.

Plasma 5

In my look at Fedora 22, I was very critical of the state of the Plasma 5 desktop environment because it was far from complete and there were many issues that prevented me from doing the daily work that I required.

Plasma 5 in Fedora 23 is far more complete and well polished. It still has a few minor rough edges, but everything works as I expect it to. I still do not care much for the default Breeze icon set, but at least now I can change to a different set using the System Settings. Despite that, I am using the default set so I can spend enough time to give them a fair test.

Too Early For Conclusions

It is way too early for any final conclusions about Fedora 23. However my brief experience so far leads me to predict that this will be an excellent release of this staple desktop OS. And so far I have only installed the desktop version and not the server version.

I will try to post a more complete review in the News and Reviews section of this web site when I have more experience with it and some time available to do so.

SystemV startup vs systemd: My presentation at All Things Open

Linux News Open Source Software

I will be presenting the talk, SystemV startup vs systemd at All Things Open on Monday, October 19th at 3:25pm in room 305B

systemd is a controversial replacement for the init daemon and SystemV start scripts that is now used by many important distributions. My presentation will cover some of the differences between these two startup systems as well as some basic usage information needed by anyone getting started with systemd.

I hope to see you there.

My “All Things Open” Talk

Information News Open Source Software

I will be presenting the talk, SystemV startup vs systemd at All Things Open on Monday, October 19th at 3:25pm. I do not yet know which room I will be in, but that should be available on the schedule when you get to the conference.

systemd is a controversial replacement for the init daemon and SystemV start scripts that is now used by many important distributions. My presentation will cover some of the differences between these two startup systems as well as some basic usage information needed by anyone getting started with systemd.

I hope to see you there.

David Both to present at All Things Open

Information News

I will be presenting at least one talk at All Things Open this October 19th and 20th.

The one talk that has been accepted so far isSystemV startup vs systemd”. systemd is a controversial replacement for the init daemon and SystemV start scripts that is now used by many important distributions. My presentation will cover some of the differences between these two startup systems as well as some basic usage information needed by anyone getting started with systemd.

I will post more details about the specific date and time when I am notified of that information.

I hope to see you there.

KDE Plasma 5 Disappoints in Fedora 22

KDE Opinion Reviews

Although Fedora is still my distro of choice, KDE Plasma 5 (KP5) is a real disappointment and makes Fedora 22 unusable for me. It is reminiscent of the switch from KDE 3.5 to KDE 4, where many things did not work and others were simply missing.

Understand that I am a KDE fanboy; it is my favorite desktop. But KP5 is unusable for me. Even after spending days trying to make it work to meet my needs I was unable to feel even marginally comfortable with it.

Many of the widgets that were present in KDE Plasma 4 are now missing, including a few that I really find useful such as the Konqueror profiles which enable me to use four default profiles for Konqueror and to create my own. In fact, Konqueror seems to ignore profiles now, even when I try to launch them from the command line. Perhaps the profile location has moved and the KDE 4 location no longer works; but that begs the question of why make that change. Konqueror is my favorite file manager and being unable to use my own profiles with it is nearly a deal breaker all by itself.

The multimedia configuration page in System Settings was unable to detect any of the multiple soundcards I have installed in my workstation. This failure, along with the inability to deal with my preconfigured Konqueror profiles, makes it impossible for me to work effectively in KP5.

The KP5 desktop itself is usable but flat, boring and uninspiring. Perhaps simplicity and clean looks is the watchword for this release but I don’t like it.

The real problem with this are the issues I had when trying to make the desktop look good for me. There are only two options for the default desktop look and no way to download more. There are also few icon options and again, no available downloads. KP5 does not recognize my existing wallpapers and was forcing me to import each individually.  Making changes to the desktop such as pointer schemes and various modifications to application appearance cause the desktop to crash repeatedly.

Underneath there are no major changes to Fedora 22 itself. The major changes like systemd, the new anaconda installer, and firewalld are well past. But the new Anaconda installer still sucks!

I did try to use various forms of GNOME, including Cinnamon and MATE, but I find those desktops too restrictive for me. So I went back to Fedora 21 with KDE Plasma 4 and I am now happy again. I will wait until KP5 is fixed before I upgrade to a newer version of Fedora – just as I did when KP4 made its appearance.

Ironically, this decision to revert to Fedora 21 is a reflection of my own somewhat inflexible approach to my desire for a flexible desktop experience. I like KDE Plasma 4 and the extreme flexibility it gives me. I find myself hampered and seriously annoyed by the lack of the features and flexibility in KP5 that I have grown used to in KP4 and I am unwilling to deal with those shortcomings for any length of time.

My main question is why would one release a desktop so seriously full of holes and annoyances?

Millennium Technology Consulting LLC Dissolved

Information

For a number of reasons, I am closing down the business entity known as Millennium Technology Consulting LLC effective immediately.

I will continue to maintain this DataBook® web site, where I post technical information for Linux system administrators and end users. If you are looking for help with Linux and other Free Open Source Software (FOSS), I post information here that – for me at least – was difficult to find or that took me a lot of time to discover through experimentation.

Because that business subsidised the operation of this web site, that source of financial support is no longer available. So, if you find this web site useful, I ask you to consider supporting it by donating so that it may continue to exist.

Thank you.

Maintenance outages today, January 08, 2014

Announcements News Site Outage

I will be performing some emergency maintenance today, to replace a couple old and failing UPS units. The batteries are OK, but the units themselves are failing after several years.

There will be a few short outages of the email and web sites during this maintenance.

Thanks for your patience.

David Both

It helps to know how things work

Linux Opinion Technical Training

It really helps to know how things work when it becomes necessary to fix them.

This was true when I was fixing audio equipment in the early ’70s, and supporting computers and software for IBM, MCI, Interpath, and Cisco over the years, and teaching Linux for Red Hat and my own company, Millennium Technology Consulting LLC. The intimate knowledge of how Linux works has also been invaluable since I started working with it in about 1996.

Unless you know how things really work, there is a tendency to use a shotgun approach to problem solving. That wastes time and, if replacing parts is involved or purchasing new software, can be quite expensive.

After all, would you be willing to pay for the auto mechanic to replace several perfectly good parts while trying to find the one part actually causing the problem – and to pay him for time and materials as well? Of course not. Although that used to be the case more often than it should have been.

I submit for your approval a problem I just fixed this morning – with this web site.

It was not a problem that affected the external operation of the DataBook web site, but I could no longer use any editor from within WordPress to edit pages and posts such as this one.

Because I know several important things about WordPress I was able to think about the problem and correct it on the first try. I know the following about WordPress:

  • The data for WordPress web sites is stored separately in a MySQL database. Separation of data and code is always a good thing to do.
  • There is one and only one, small site configuration file for each WordPress web site, wp-config.php.
  • All WordPress plugins, themes, and uploaded graphics also have their own directories.
  • The Apache web configuration is separate from the WordPress site configuration.

So it was a simple matter to simply delete the entire directory in which the WordPress instance was installed for that web site. Everything.

I then copied the entire directory structure from a known working web site to replace the one I deleted. I then copied the original wp-config.php to the appropriate location in the newly copied WordPress directory structure and my web site was up and running again. It was then trivial to copy from backups the rest of the plugins and graphics to complete the process. All in all it took less than 5 minutes.

Not having the understanding I do of how WordPress, MySQL and Apache work together to produce a web site, I would have been tempted to simply delete everything in the WordPress directory (/var/www) for that web site and start over by reinstalling WordPress and configuring it from scratch. As easy as that is for WordPress, it would still have taken much longer than it did for me to actually fix the problem.

If I had understood more about the PHP coding of WordPress itself, I probably could have simply repaired the offending file that was likely corrupted for some reason. But that would probably taken much longer in any event.

If you are interested in learning how Linux works so that you can identify, understand and fix problems in the most effective ways, try the Linux classes I offer at Millennium Technology Consulting LLC.

CentOS 7.0 released

Linux News

CentOS 7 was released today, July 7.

CentOS is identical to Red Hat Enterprise Linux (RHEL) with the only exception being the branding text and graphics. CentOS is a fully supported Community ENTerprise Operating System that provides free upgrades and support.

CentOS 7 incorporates several major changes and enhancements. These includes things like systemd and GNOME 3. In addition, the XFS file system is now the default.

Many of the new features in CentOS, such as systemd, have been around for a couple years, most notably in the Fedora distribution. Fedora is the upstream feeder to RHEL and many new RHEL features are first introduced in Fedora.

See http://www.centos.org/ for more details anout CentOS 7.

David Both to present “SystemV Startup vs systemd” at TriLUG on May 8

Announcements News

I will be giving a presentation, “SystemV Startup vs systemd” at the TrilUG meeting on Thursday, May 8.

Topic: SystemD
Presenter: David Both
When: Thursday, 8th May 2014, 7pm (pizza from 6.45pm)
Where: NC State Engineering Building II Room 1021, Centennial Campus
Parking: The parking decks and Oval Drive street parking are free after 5pm
Website: http://trilug.org/2014-05-08/systemd

The new systemd daemon replaces the init process for some distributions already and is coming to many more. systemd provides service management and much more as well as startup for services designated to run on startup. It is designed to increase startup speeds as well as to conserve system resources by using a new startup strategy in which services are not started until they are actually required. This presentation will briefly review the Linux boot process and the old SystemV startup process. It will then discuss in more detail the startup process using systemd, and the reasons for creating the new systemd daemon and some of the advantages it provides. We will also discuss configuration files and some of the more common commands required to cause systemd to do our bidding. Backward compatibility will also be covered.

I hope to see you there.

Dealing with the HeartBleed bug

News Security

It has been a very hectic couple days since I woke up Tuesday morning to the news about the so-called HeartBleed bug. I spent a good bit of time Tuesday exploring the available information and then creating a program that would do much of the work required to actually fix the problem, and then testing my program. I spent a good deal of Wednesday fixing the problem on the computers for which I have some responsibility.

I have taken a bit of a breather after all that and here is my assessment.

HeartBleed is the most serious bug ever

HeartBleed is a bug that is both dangerous and insidious. If you have a computer that is on the Internet, you must assume that your data has been stolen. Even worse, you have no way to know who has been stealing your data or for how long; this bug opens up your data in such a way that no trace of the crime is left behind.

There is even a web site dedicated to HeartBleed, that provides the gory details about this bug and its effects that is strictly factual and contains none of the hype required by alleged news organizations that are primarily entertainment and not information – infotainment.  Unfortunately, in this case, most of the hype seems to be deserved.

What it does

The HeartBleed bug does nothing by itself. It simply provides an open door to crackers (black hat hackers) who use that door to steal personal data. HeartBleed affects the OpenSSL library of security programs that are used by most computer systems. The bug allows access to the memory of the affected server.

When your computer connects to a web site that uses encryption, such as your bank, the OpenSSL code is used for communicating between your computer and the bank’s computer. When there is no activity for a period of time, OpenSSL produces a heartbeat, a simple transmission of a packet of data that says “I am still here” to the server that prevents the server from closing the connection before you are finished with your business and the server responds with a simple acknowledgement of that “ping.”

The crackers can use this by faking a heartbeat signal from your computer. The acknowledgement is sent back to the cracker’s computer and the cracker can then request data from the memory of the server. The memory leaked to the cracker can contain any or all of your personal data stored on that site.

The affected computers are the servers that run most of the websites in the world and that contain your medical, personal and financial data including your social security numbers, banking information and everything else you don’t want the bad guys to have access to.

The worst part is that you do not have to do anything to have your data stolen except to visit a web site you already trust like your bank.

Recovery

Almost every version of the OpenSSL library has been fixed. And most of the large organizations that have servers, such as banks and other financial institutions, eCommerce websites like, hopefully, Amazon, Google and so on, have already patched their web sites.

The first thing you should do is install the latest updates to your own computer(s) regardless of which operating system you use. If your operating system is too old for new updates, such as Windows 95 or XP, or Fedora Linux 18 or earlier, upgrade your operating system and install all of the current updates. If you need to upgrade your computer in order to upgrade your operating system, then do so.

Second, change all of the passwords you use on web sites. ALL OF THEM!  All of your passwords have been compromised. If you continue to use them your data will be stolen.

The real problem is in knowing whether the web sites you use and which have some of your sensitive data have been fixed. By this morning, Thursday, April 10, many have some sort of notice on their login page. In most cases the ones I see seem to say that they never had a problem.  But you cannot count on that. Many are ignoring it entirely. Just do the best you can. Change all of your passwords anyway. If you learn later that the web site did not fix the vulnerability until after you had changed your password, change it again.

A few password guidelines:

  • Never use the same password on multiple web sites. Thus if one site is compromised, you won’t have to change all of your passwords.
  • Use long passwords that are at least 8 characters in length. This makes it much more difficult to guess or crack your password.
  • Passwords should contain a combination of lower and upper case letters, numbers, and special characters. This makes it much more difficult to guess or crack your password.
  • Never use the same password twice. An old password that was hacked, if used over, can still be used to attack your account.
  • Do not use birth dates, Social Security Numbers, pet, friend or spouse names, or dictionary words for your passwords. This will make it much more difficult to social engineer your passwords.
  • Change your passwords frequently. At least every 90 days, but once a month is even better. This will limit the time of your vulnerability if a site is compromised.
  • Never write down your passwords. Ever.

Good security is hard work

Yes, good security is hard work. That is why companies hire a lot of expensive people to handle it for them. For end users, it also takes time and some creativity to come up with reasonable passwords that are safe but which can also be remembered. It will be frustrating.

Bad security is an even bigger hassle. It can cost you your identity, lots of money and a great deal of time and frustration – far more than good security will cost.

FAQs about the HeartBleed vulnerability

Information Security

I received this on the CentOS list. You might find it helpful.


Since this is the first post about the openssl update, I want to answer
a couple questions here:

1. The first susceptible version of openssl in a CentOS release was
openssl-1.0.1e-15.el6, released on December 1, 2013.

2. The version of openssl that you should install to fix the issue is
openssl-1.0.1e-16.el6_5.7, released on April 8, 2014.

3. Versions of CentOS-6.5 openssl that were affected are:
openssl-1.0.1e-15.el6, openssl-1.0.1e-16.el6_5,
openssl-1.0.1e-16.el6_5.1, openssl-1.0.1e-16.el6_5.4.

4. Only CentOS-6.5 was affected. CentOS-6 at versions 6.4 or earlier
was not affected. No versions of CentOS-5 (or any other CentOS) were
affected.

Besides doing updates, things you should do include:

1. Besides doing the updates, you should replace any certificates using
SSL or TLS that are openssl based. This includes VPN, HTTPD, etc. See
http://heartbleed.com/ for more info on impacted keys.

2. See this page for figuring out which services you should restart
after applying updates .. or just reboot the machine which will restart
all services:

https://access.redhat.com/site/solutions/781793

Free “Introduction to Linux” course from the Linux Foundation, edX, MIT and Harvard

Linux News Training

Free classes are always cool, especially in times when companies do not have big training budgets. And it seems like one of the best training opportunities in years is here.

Linux is hot as a job skill. The Linux Foundation’s 2014 Linux Jobs Report found that 90 percent of hiring managers are looking to hire Linux professionals in the next half-year. But demand is greater than supply. Not only is Linux hiring hot, but Linux professionals are also getting larger and more frequent pay raises.

The Linux Foundation along with edX and major educational institutions Harvard and MIT have combined to provide a Massive Open Online Course (MOOC), Introduction to Linux. This course is free of charge and you can take it to earn a certificate or you can audit the course if you cannot make the full time commitment.

The course will be available some time in the 3rd quarter of 2014. The folks at VentureBeat have a short writeup about this which sounds quite interesting. You can read about the course and register here. It is estimated that the time commitment if you take this course is 40 to 60 hours.

Now you might ask why, as a Linux trainer, I would suggest you take this course rather than mine? Well, free is free, right?

I do plan to take this class myself as there is always more to learn. I enjoy teaching my own two-day “Introduction to Linux” course, and I do get paid for it. So, again, why? Because I cannot imagine that anything done by the Linux Foundation and the combination of organizations that have put this course together would not be really, really good.

Opportunities like this do not come along frequently. Take advantage of it.

Linux Security Bug – Update

News Security

The security bug is identified as CVE-2014-0092 now has fixes available for the following distributions of which I am certain.

  • CentOS
  • Debian
  • Fedora
  • Red Hat

Check your own distribution to verify the availability of the fix. Note that not all releases of these distros have a fix available yet. If your release does not have a fix for this bug you should seriously consider upgrading to a release that does.

Serious security bug found in Linux

News Open Source Software Security

A very serious bug has been found in the Open Source GnuTLS package. Many programs and the Linux operating system itself use this package to deal with the encryption of data streams. The bug was discovered during a routine code audit by Red Hat, and appears to be a simple error by a programmer. This is as opposed to the flaw intentionally inserted into the cryptography algorithm by the NSA to enable them to eavesdrop on encrypted communications. The NSA flaw does not affect Linux.

The fix is available and I have explicitly confirmed that it has been included in an update for GnuTLS on CentOS that was made available this morning. I have installed it on my server and firewall here which all use CentOS and ensured that nothing else obvious is broken. I have no idea whether this update requires a reboot, but I will reboot all of the affected CentOS systems after the updates have been installed.

This fix is not yet available for Fedora. Check the updates for your own distribution to verify whether this fix has been included or not.

Part of the news here is that serious security bugs in Linux, as this one is, are few and far between so it gets heavy media coverage. The other part of the news, and the part that will get little or no coverage, is that it is only because the code is Open Source that Red Hat could perform an audit and discover the problem. The open source aspect of this code is also the reason that the fix is available so quickly after the problem is discovered, and the ease with which I can confirm that it is included in the new version of the GnuTLS package by looking at the changelog.

The link below goes into more detail, if you are interested.

http://arstechnica.com/security/2014/03/critical-crypto-bug-leaves-linux-hundreds-of-apps-open-to-eavesdropping/#p3


Training Calendar set for first half of 2014

Linux News Training

Millennium Technology Consulting LLC has finalized its class schedules for the first half of 2014.


Training Calendar for First Half of 2014
Course Date Availability
Theory and Practice of Linux System Administration February 24 – 28  Seats available
Linux Servers and Advanced System Administration March 17 – 21  Seats available
Theory and Practice of Linux System Administration March 31 – April 4  Seats available
Linux Servers and Advanced System Administration April 14 – 18  Seats available
Theory and Practice of Linux System Administration April 28 – May 2  Seats available
Theory and Practice of Linux System Administration May 19 – 23  Seats available

Theory and Practice of Linux System Administration

This course is intended for trainee or  junior Linux Systems Administrators who wish to advance their knowledge, and administrators of other Unix versions or Windows who wish to become Linux System Administrators. This class is heavily oriented towards hands-on activities. At least half of the class time is allotted to lab projects.

CentOS

This class is taught using CentOS because it is the downstream distribution of Red Hat Enterprise Linux (RHEL) and is identical in every way except for branding. There will be some discussion of the features found in Fedora and which may appear in future versions of RHEL and  CentOS.

See the Theory and Practice of Linux System Administration page for a complete course description and prerequisites.

Linux Servers and Advanced System Administration

This course is intended for experienced Linux System Administrators who wish to learn advanced troubleshooting techniques and server installation and configuration. By the end of the class each student will have a fully working Linux system with a firewall; a name server with forward and reverse zones; a DHCP server; an email server with integrated anti-spam; two working web sites with one a static HTML site and the other a complete WordPress site with a MySQL back end; A MailMan mailing list server; A VNC server; NFS and Samba shares. The student will also learn to build RPM packages.

See the Linux Servers and Advanced System Administration  page for a complete course description and prerequisites.

Discounts

Discounts are available to members of the Triangle Linux Users Group (TriLUG) of $500 per class. You must have and show your TriLUG membership card to obtain this discount. This discount may be used in conjunction with other discount offers.

Custom Class Scheduling

Millennium Technology Consulting LLC can provide customized scheduling for classes. If you do not see a class scheduled within your desired time frame we can work with you to schedule one that meets your needs. We also offer on-site training at your location. Please contact us to schedule a class for you.

Theory and Practice of Linux System Administration class, January 20 – 24

Linux News Training

Millennium Technology Consulting LLC, will be running the highly reviewed class, Theory and Practice of Linux System Administration, the week of January 20 – 24.

About this Course

This course is intended for  junior and mid-level Linux Systems Administrators who wish to advance their knowledge, and administrators of other Unix versions or Windows who wish to become Linux System Administrators. This class is heavily oriented towards hands-on activities. At least half of the class time is allotted to lab projects.  Experienced Linux System Administrators also find this class valuable. Taken from my own experiences accumulated during more than 15 years of using Linux, and developed using my knowledge and experience as a course developer and trainer for both IBM, Red Hat, and other companies, this class covers the practical aspects of Linux System Administration. It builds upon the foundation of the “Philosophy of Linux” in a way that helps the student understand how and why things are done as they are.

Our courses are always highly rated and well reviewed. Here are some comments from previous students taken directly from the course evaluation forms.

Course Description

The student will learn about the history of Linux and the philosophy of Linux and how it applies to the everyday tasks that she will be expected to perform. The student will install a current Centos Linux system on common Intel hardware, using various installation options to customize the final result. The students will learn to use the command line interface (CLI) and many basic Linux commands along with the vi editor. More advanced commands such as sed and awk will be covered and combining all of these commands into short command line programs will be discussed and the student will have opportunity to use them in lab projects.

This course covers the Linux boot sequence and the traditional SystemV init scripts as well as an introduction to the new systemd daemon for startup and daemon management. The student will learn to manage users and software packages. Networking, security, processes, filesystems and Logical Volume Management will be covered in detail.

For complete details of this course see the Theory and Practice of Linux System Administration page.

Theory and Practice of Linux System Administration class, November 11 – 15

Information Linux Training

For the last time this year, Millennium Technology Consulting LLC, will be running the highly reviewed class, Theory and Practice of Linux System Administration, the week of November 11 – 15.

About this Course

This course is intended for  junior and mid-level Linux Systems Administrators who wish to advance their knowledge, and administrators of other Unix versions or Windows who wish to become Linux System Administrators. This class is heavily oriented towards hands-on activities. At least half of the class time is allotted to lab projects.  Experienced Linux System Administrators also find this class valuable.Taken from my own experiences accumulated during more than 15 years of using Linux, and developed using my knowledge and experience as a course developer and trainer for both IBM and Red Hat, this class covers the practical aspects of Linux System Administration. It builds upon the foundation of the “Philosophy of Linux” in a way that helps the student understand how and why things are done as they are.

Our courses are always highly rated and well reviewed. Here are some comments from previous students taken directly from the course evaluation forms.

Course Description

The student will learn about the history of Linux and the philosophy of Linux and how it applies to the everyday tasks that she will be expected to perform. The student will install a current Fedora Linux system on common Intel hardware, using various installation options to customize the final result. The students will learn to use the command line interface (CLI) and many basic Linux commands along with the vi editor. More advanced commands such as sed and awk will be covered and combining all of these commands into short command line programs will be discussed and the student will have opportunity to use them in lab projects.

This course covers the Linux boot sequence and the traditional SystemV init scripts as well as an introduction to the new systemd daemon for startup and daemon management. The student will learn to manage users and software packages. Networking, security, processes, filesystems and Logical Volume Management will be covered in detail.

For complete details of this course see the Theory and Practice of Linux System Administration page.

Theory and Practice of Linux System Administration class, September 23 – 27

Announcements Millennium Technology Consulting LLC Training

My company, Millennium Technology Consulting LLC, will be running the highly reviewed class, Theory and Practice of Linux System Administration, the week of September 23 – 27.

About this Course

This course is intended for  junior and mid-level Linux Systems Administrators who wish to advance their knowledge, and administrators of other Unix versions or Windows who wish to become Linux System Administrators. This class is heavily oriented towards hands-on activities. At least half of the class time is allotted to lab projects.  Experienced Linux System Administrators also find this class valuable.Taken from my own experiences accumulated during more than 15 years of using Linux, and developed using my knowledge and experience as a course developer and trainer for both IBM and Red Hat, this class covers the practical aspects of Linux System Administration. It builds upon the foundation of the “Philosophy of Linux” in a way that helps the student understand how and why things are done as they are.

Our courses are always highly rated and well reviewed. Here are some comments from previous students taken directly from the course evaluation forms.

Choice of distribution

Students attending this class have a choice of which distribution on which they wish to concentrate and to use for lab projects. This class can be based either on Fedora because it is the upstream distribution for Red Hat Enterprise Linux (RHEL) and provides some insight into features and functions that may show up in RHEL in the future, or on CentOS as it reflects the current state of RHEL.

Course Description

The student will learn about the history of Linux and the philosophy of Linux and how it applies to the everyday tasks that she will be expected to perform. The student will install a current Fedora Linux system on common Intel hardware, using various installation options to customize the final result. The students will learn to use the command line interface (CLI) and many basic Linux commands along with the vi editor. More advanced commands such as sed and awk will be covered and combining all of these commands into short command line programs will be discussed and the student will have opportunity to use them in lab projects.

This course covers the Linux boot sequence and the traditional SystemV init scripts as well as an introduction to the new systemd daemon for startup and daemon management. The student will learn to manage users and software packages. Networking, security, processes, filesystems and Logical Volume Management will be covered in detail.

For complete details of this course see the Theory and Practice of Linux System Administration page.