Lets say you have some files in /srv/http/important and are of varying sizes, but in total several GB.
So you allow only 1 user to read that folder, and now you want to be notified if any processes of said user are performing reads on that directory AND have almost equal bandwidth usage as the size read from disk? Lets make it easier, and just say, if a process has something opened in that folder, ever during its lifetime, and has outgoing bandwidth usage which is average of files in that folder over span of 5minutes, do something whatever?
Whats the easiest IDS to configure this? How would you do it? Please avoid answering with "dont do that and solve this other problem instead".submitted by /u/pm_me_your_root
Docker Expands Container Networking Capabilities
When Docker 1.0 debuted in June 2014, it was missing a key feature: fully integrated networking that works. In June 2016, networking in Docker containers is a very different story, with a host of new capabilities now present in the Docker 1.12 milestone, which was officially released last week.
At the core of Docker's networking capabilities is the libnetwork stack, which first debuted in the Docker 1.7 release in June 2015 and became fully integrated in the Docker 1.9 update. Libnetwork is based on technology built and since expanded by SocketPlane, a company that Docker acquired in March 2015.
- Sony Settles in Linux Battle
- Basic PHP 7 and Nginx Configuration on Ubuntu 16.04 Linux
- Writing an Ansible module for a REST API
Stellaris patch Asimov 1.2 released, it's a good one
I've been scared to click that play button on Stellaris recently, as it sucks up so much time it's crazy. The patch named Asimov has been released!
To be honest with you, I still think it's one of the best strategy games available to date on Linux. For a space sci-fi fan like myself it's a wet dream.
Factorio 0.13 released, the changelog is massive, much improved networking too
Factorio is an absolute gem of a sandbox game and I love it. It's another game I'm terrible scared to load up as I will lose days to it, this new update has me inching closer to the play button.
Tobias Mueller: GNOME 3.20 - Five years after 3.0
GNOME 3.20 has just been released on 21st of March.
- antiX 16 Is around the Corner!
- Peppermint 7 Screencast and Screenshots
Time to retire
I’m sad to say it’s the end of the road for me with Gentoo, after 13 years volunteering my time (my “anniversary” is tomorrow). My time and motivation to commit to Gentoo have steadily declined over the past couple of years and eventually stopped entirely. It was an enormous part of my life for more than a decade, and I’m very grateful to everyone I’ve worked with over the years.
My last major involvement was running our participation in the Google Summer of Code, which is now fully handed off to others. Prior to that, I was involved in many things from migrating our X11 packages through the Big Modularization and maintaining nearly 400 packages to serving 6 terms on the council and as desktop manager in the pre-council days. I spent a long time trying to change and modernize our distro and culture. Some parts worked better than others, but the inertia I had to fight along the way was enormous.
- openSUSE.Asia Summit Call for papers is open
Red Hat Reiterates Support for Java EE With New Release
Red Hat officially closed on its acquisition of enterprise Java tools vendor JBoss for $350 million last June. Ever since, Red Hat has been growing its Java application tools business and expanding its development products and projects.
- Red Hat Incorporated (NYSE:RHT) Sellers Covered 1.05% of Their Shorts
- 3 Things Red Hat Inc.'s Management Wants You to Know
Why Debian Policy is important to package quality
Unless you are a Debian maintainer, you probably haven't read the Debian Policy Manual. However, when Ubuntu started promoting Snappy packages as a more secure solution to package management, the claim was challenged, not by reference to the technical structure of Debian packages, but to the Debian Policy Manual.
Google to step up smartphone wars with release of own handset
Google is planning a shake-up of the smartphone market by releasing its own handset, a move that would tighten its grip on mobile software and see it compete directly with the iPhone.
- Should Google release its own high-end Android phone?
- Can pushing DevOps to the edge democratize IoT?
- A different ballgame: It's training season for multi-cloud players
- Can your feedback help build a better OpenStack?
- Cloud 2.0: Get ready to take app development to a new level
- The open-source 'stable' release: Bringing order to the Wild West of IT
Which browser is best for battery life: We test Edge vs. Chrome vs. Opera vs. Firefox [Ed: Microsoft is spying on all users of its so-called ‘browser’ (proprietary spyware) to help manufacture false/misleading claims about it]
So here’s the thing. My own tests shows Edge has a clear power advantage in light browsing chores; it’s just not as dramatic as Microsoft’s own tests. But the truth is actually more complicated because our browsing habits are so different, and can change from day to day. If you play a game or use Outlook all day, you can make a pretty good guess about how each will impact battery life. A browser though is a window to the unlimited and ever-changing Internet and no one uses it the same way.
The Tech Preview Of Servo/Browser.html Is Imminent!
For months there's been talk of a Servo/Browser.html technical preview in June and there's just one week left to the month... It looks like Mozilla is still planning on meeting this milestone!
Servo has made much progress this year as a next-generation browser layout engine written in Rust and featuring cool features like its GPU back-end while they've long been planning to ship a technical preview release in June along with a TP of their Browser.html front-end. They also have still been planning to ship at least one Servo component inside Gecko/Firefox this calendar year.
- Keynote: Spark 2.0 - Matei Zaharia, Apache Spark Creator and CTO of Databricks
ZFS: The other new Apple file system that almost was—until it wasn’t
I attended my first WWDC in 2006 to participate in Apple's launch of its DTrace port to the next version of Mac OS X (Leopard). Apple completed all but the fiddliest finishing touches without help from the DTrace team. Even when Apple did meet with us, we had no idea that it was mere weeks away from the finished product being announced to the world. DTrace was a testament both to Apple's engineering acumen as well as its storied secrecy.
A ZFS developer’s analysis of the good and bad in Apple’s new APFS file system
Apple announced a new file system that will make its way into all of its OS variants (macOS, tvOS, iOS, watchOS) in the coming years. Media coverage to this point has been mostly breathless elongations of Apple's developer documentation. With a dearth of detail I decided to attend the presentation and Q&A with the APFS team at WWDC. Dominic Giampaolo and Eric Tamura, two members of the APFS team, gave an overview to a packed room; along with other members of the team, they patiently answered questions later in the day. With those data points and some first-hand usage I wanted to provide an overview and analysis both as a user of Apple-ecosystem products and as a long-time operating system and file system developer.
What do aquafaba and open-source software have in common? (And what is aquafaba, anyway?)
For his part, Wohlt is exploring ways to protect the online collaborative process. In his view, even more important than the transformation of bean water into an extraordinarily useful vegan ingredient is the community that has developed around it.
This programmable, open source outlet can do things that off-the-shelf smart plugs can't
Excited by the idea of an open-source, Arduino-based outlet, capable of remotely controlling your various household devices?
If so, you’ll definitely want to check out the Portlet: a versatile portmanteau of “portable” and “outlet,” which — despite only consisting of 4 buttons and a simple 2×15 character LCD screen — can be programmed to do everything from switching your lights on at a certain time to keeping your coffee heated at the perfect temperature.
Chrome vulnerability lets attackers steal movies from streaming services
A significant security vulnerability in Google technology that is supposed to protect videos streamed via Google Chrome has been discovered by researchers from the Ben-Gurion University of the Negev Cyber Security Research Center (CSRC) in collaboration with a security researcher from Telekom Innovation Laboratories in Berlin, Germany.
Large botnet of CCTV devices knock the snot out of jewelry website
Researchers have encountered a denial-of-service botnet that's made up of more than 25,000 Internet-connected closed circuit TV devices.
The researchers with Security firm Sucuri came across the malicious network while defending a small brick-and-mortar jewelry shop against a distributed denial-of-service attack. The unnamed site was choking on an assault that delivered almost 35,000 HTTP requests per second, making it unreachable to legitimate users. When Sucuri used a network addressing and routing system known as Anycast to neutralize the attack, the assailants increased the number of HTTP requests to 50,000 per second.
Study finds Password Misuse in Hospitals a Steaming Hot Mess
Hospitals are pretty hygienic places – except when it comes to passwords, it seems.
That’s the conclusion of a recent study by researchers at Dartmouth College, the University of Pennsylvania and USC, which found that efforts to circumvent password protections are “endemic” in healthcare environments and mostly go unnoticed by hospital IT staff.
The report describes what can only be described as wholesale abandonment of security best practices at hospitals and other clinical environments – with the bad behavior being driven by necessity rather than malice.
Why are hackers increasingly targeting the healthcare industry?
Cyber-attacks in the healthcare environment are on the rise, with recent research suggesting that critical healthcare systems could be vulnerable to attack.
In general, the healthcare industry is proving lucrative for cybercriminals because medical data can be used in multiple ways, for example fraud or identify theft. This personal data often contains information regarding a patient’s medical history, which could be used in targeted spear-phishing attacks.
- Making the internet more secure
- Beyond Monocultures
- Dodging Raindrops Escaping the Public Cloud