Updated: 2017-11-14 16:52 EST

This material is for interest only. It will not be tested.

Tux the Linux Penguin mascot

Tux the Linux Penguin mascot

1 Looking for Unix sysadmin in OttawaIndexup to index

https://www.versature.com/unix-sysadmin/ Cached page

Are You The Unix SysAdmin We’re Looking For?

“Looking for your next challenge? Want to work for a SaaS company that has been voted Employer of the year for 3 years in a row? Of course you do! We are on the lookout for a Unix SysAdmin for Team Versature who will be directly responsible for providing reliable, secure and stable services to customers.”

2 Linux smartphoneIndexup to index

http://www.zdnet.com/article/purism-linux-smartphone-makes-its-1-5-million-crowdfunding-goal/

“Hundreds of millions are happy with Android smartphones and iPhones. But there are some users who want the maximum possible control over their smartphones. For those people, Purism now has the funding it needs for its free-software smartphone without a trace of proprietary code or firmware: The Purism Librem 5 smartphone.”

3 Open Source (Linux) Skills for MicrosoftIndexup to index

http://blog.cbtnuggets.com/2017/05/open-source-skills-for-the-microsoft-master/

“So, if you’ve avoided Linux so far, the de facto open source OS with a storied background, now is the time to change your tune — Microsoft has.”

4 Microsoft skills for LinuxIndexup to index

http://blog.cbtnuggets.com/2017/05/microsoft-skills-for-the-open-source-guru/

“Linux is a logical strategy for Microsoft as enterprise computing continues to move into the cloud. This is because Linux is well-understood as a cloud environment. An increasing number of companies are moving their computing into public and private clouds. Linux keeps Microsoft in the game.”

“In addition, Microsoft is now focusing more on server admin with PowerShell instead of the GUI. This is good news for open source gurus.”

5 Microsoft Nano Server has no GUIIndexup to index

Learn to use the command line. The future has no GUI:

http://blog.cbtnuggets.com/2016/09/windows-through-the-years-a-retrospective/

“Nano Server is a ‘headless’ operating system — a stripped down version of Windows Server that excludes everything required to support a GUI. Nano Servers are tiny—less than a 10th of what a full Windows Server image requires. This means ops managers can squeeze many more virtual Windows Servers into their physical server boxes. In addition, the smaller footprint should make Nano Server less susceptible to ‘bad guy’ attacks.”

6 Closed source unwanted featuresIndexup to index

Vendors can hide whatever software they want on your computer if you don’t have access to the source code that created it:

http://www.bleepingcomputer.com/news/security/keylogger-found-in-audio-driver-of-hp-laptops/

“The audio driver installed on some HP laptops includes a feature that could best be described as a keylogger, which records all the user’s keystrokes and saves the information to a local file, accessible to anyone or any third-party software or malware that knows where to look.”

7 Top skills in demandIndexup to index

“4 hot skills for Linux pros in 2017” “Which in-demand skills are you brushing up on in the new year?”

http://opensource.com/article/17/1/yearbook-4-hot-skills-linux-pros-2017

  1. Security
    “we need to be security conscious in every decision we make”

  2. DevOps
    “learn about DevOps so they can succeed in the workforce”

  3. Development
    “we also need system administrators to have programming skills”

  4. Soft skills
    “they are probably skills most likely to determine your success”

8 Patching the Windows WannaCrypt attack uses command lineIndexup to index

http://www.techrepublic.com/article/patching-wannacrypt-dispatches-from-the-frontline/

In the spring of 2017, the WannaCrypt ransomware infected Windows machines everywhere. This is the Batch file a sysadmin used to patch a hundred vulnerable Windows machines:

FOR /F "tokens=1" %%i in (computers.txt) do xcopy patch.msu \\%%i\c$\logs /D
FOR /F "tokens=1" %%i in (computers.txt) do psexec -s -d \\%%i c:\windows\system32\wusa c:\logs\patch.msu /quiet
pause

This is command line he used to confirm the patch:

C:\> wmic qfe | find "KB4012212"

Learn to use a command line; it’s how things get done, even in Windows.

9 Career with Communications Security EstablishmentIndexup to index

Do you think you need Linux skills for this job?

sudo stop all hackers

sudo stop all hackers

10 VIM editor turns 25 years oldIndexup to index

http://www.theregister.co.uk/2017/01/24/boring_vim_beats_exciting_browsers/

Alas, I don’t expect things to change from their current course. If anything the future looks to be full of more abstractions, more pointless UI rewrites, more frameworks that break backwards compatibility, and more cancer-like growth. Which is why Vim is so important.

At least our text editors will still be there, stalwart unchanging places to reliably weather the storm. Thanks, Vim, I quite literally could not do what I do without you. Happy 25th birthday and here’s to another ten years before Vim 9 rolls around.

11 Asked to convert SAS to R, replies to install Unix toolsIndexup to index

On the local GOSLING (Getting Open Source Logic INto Governments) mailing list, a query came up about how to migrate from the expensive, proprietary SAS statistical package to the free, open source R package. The reply said “install Unix command line tools”:

The amount of work can be reduced by using some Unix command line tools. These are a part of Linux and can easily be added to Mac OS (Xcode from Apple) or Windows 10 (“Bash on Ubuntu on Windows” from Microsoft or “Cygwin Tools” from cygwin.org). These tools extend the possibilities for automation. They can also be used to increase reproducability and auditability in manual work. And they can be used to analyze SAS code to learn more about the problems that will be encountered.

Learn the command line!

12 10 open source tools for your sysadmin toolboxIndexup to index

“Sysadmins, no matter what platforms they work on, are awash in great open source software tools. In this article, we highlight well-known—and not-so-well-known—tools that have released new versions in 2016.”

http://opensource.com/16/12/yearbook-10-open-source-sysadmin-tools

13 Microsoft adopts Linux command-line technologyIndexup to index

Microsoft tells devs: Whatever you’re doing in Linux, Windows 10 will soon do it too

The tech giant lays out its plans for the future of Ubuntu and Bash on Windows 10.

http://www.techrepublic.com/article/microsoft-tells-devs-whatever-youre-doing-in-linux-windows-10-will-soon-do-it-too/

Microsoft has pledged that Windows 10 will eventually run the bulk of Linux software used by developers.

The firm recently updated Windows 10 to let users run a range of Linux tools from inside the OS.

In what appears to be an attempt by Microsoft to woo developers using Linux-based OSes and Mac OS X, the firm has said it will continue to improve Windows 10’s support for Linux command-line tools.

The other major new addition will be increased interoperability between the Bash and Windows environments. Effectively this will let developers call Windows applications from within Bash — allowing them to write a Bash script to automate a complex build that includes Windows applications […]

14 Darknet: BotNets and The Bad InternetIndexup to index

http://www.level3.com/~/media/files/white-paper/en_secur_wp_botnetresearchreport.pdf

Safeguarding the Internet: Level 3 BotNet Research Report, June 2015

Botnets are a group of Internet connected programs resident on various devices communicating together to perform tasks. These devices can be Web servers, personal or work computers, mobile devices or cable modems. Botnet tasks include scanning new targets, exfiltrating data, distributing malicious software (malware such as viruses, worms and keyloggers), stealing personal information or intellectual property, or attacking other targets (e.g. DDoS attacks). Most of the machines that are a part of the botnet are also victim machines. They are infected through a number of methods, including phishing emails, visiting compromised sites or installing compromised software. Command and control servers (C2s) are the brains of the operations. C2s issue instructions to infected machines to perform a task like an attack.

“Every day, our security team monitors approximately 1.3 billion security events and mitigates roughly 22 distributed denial of service (DDoS) attacks. The team identifies, and removes, on average, one control and command server (C2) network per day. […] In the first quarter, significant C2 communications originating from points in countries including Ukraine, Russia and the Netherlands targeted potential victims in the United States. […] According to our research, the average number of infected hosts per C2 is 1,700. Over the course of the year, we track 600 to 1,000 C2s, which control millions of infected hosts. […] From a vertical perspective, the gaming industry, Internet service providers, Web hosting companies, research and education firms and the financial industry were the hardest hit in the first quarter of 2015.”

“In our research, we pay specific attention to trends in botnet behavior, DDoS attacks and malware. Malicious actors use these tools to gain control of corporate assets and turn them into compromised endpoints. They use these infected machines to distribute malware, disrupt business, establish system penetration and steal company intellectual property (exfiltration). Out of the more than 1,000 C2s we tracked during the first quarter of 2015, we found over 600 being used for malicious communications targeting corporate environments. Left unchecked, these C2s have the potential to disrupt business and destroy critical information assets.”

15 Why do hackers prefer LinuxIndexup to index

http://www.techworm.net/2016/09/real-hackers-prefer-linux-windows-mac.html

“We have published many tutorials for hackers and security researchers. You may have noticed that most tutorials are based on Linux operating systems. Even the hacking tools out there are based on Linux barring a few which are written for Windows and Mac. […] Linux was designed around a strong and highly integrated command line interface. Windows and Mac don’t have that. This grants hackers and Linux far greater access and control over their system and awesome customization. This is the reason that most hacking and pentesting tools are built into Linux have greater functionality above and beyond their windows counterparts.”

16 Linux dominates the Internet after 25 yearsIndexup to index

“Venturing onto the Internet means entering a world dominated by Linux, especially with the biggest websites. Of the top million most visited web domains, nearly 97 percent run Linux web servers, compared with just 1.7 percent that run Windows.”

http://www.inverse.com/article/21102-and-linux-wept-for-there-were-no-more-worlds-to-conquer

“Take smartphones: Google’s Android system is descended from the original Linux kernel, meaning every Android phone is fundamentally a Linux device. The precise numbers vary, but Android probably runs on about 80 percent of all the world’s smartphones and 60 percent of all the world’s tablets. Sure, Windows or the Mac OS might be the system waiting for people when they sit down at their desks, but odds are the operating system they carry around in their pocket, play around with when bored, and take to bed with them even when they really, really shouldn’t? That’s Linux.”

17 SpaceX runs LinuxIndexup to index

If you dream of having a job that actually is rocket science, learn Linux:

http://en.wikipedia.org/wiki/Falcon_9

“SpaceX uses multiple redundant flight computers in a fault-tolerant design. Each Merlin rocket engine is controlled by three voting computers, each of which has two physical processors that constantly check each other. The software runs on Linux and is written in C++.”

18 Microsoft supports Linux programs on Windows 10Indexup to index

http://arstechnica.com/information-technology/2016/04/why-microsoft-needed-to-make-windows-run-linux-software/

“Perhaps the biggest surprise to come from Microsoft’s Build developer conference last week was the Windows Subsystem for Linux (WSL).”

“Many developers are very familiar with the bash shell, with building software using make and gcc, and editing text in vi or emacs. WSL will give these developers versions of these tools that are equal in just about every regard to the ones you get on Linux, because they’ll be the ones you get on Linux running unmodified on Windows.”

“WSL also doesn’t include X Windows or any other graphical subsystem; it’s strictly for command-line applications only.”

“The system will ship as part of this summer’s Anniversary Update for Windows 10. WSL has two parts; there’s the core subsystem, which is already included in Insider Preview builds of the operating system, and then a package of software that Canonical will provide. The core subsystem is what provides the Linux API on Windows, including the ability to natively load Linux executables and libraries. Canonical will provide bash and all the other command-line tools that are expected in a Linux environment.”

http://www.linuxjournal.com/content/ubuntu-windows

“Microsoft and Canonical have spent the last several months working in secrecy to bring Ubuntu to Windows—and not through virtualization or a containerized environment. No, the goal was to run Linux apps natively in Windows.”

“[…] the focus is very much on the command-line interface, particularly the Bash shell. As any seasoned Linux developer or administrator will tell you, the CLI offers unparalleled power. And even those who have learned to love the bells and whistles of modern integrated development environments still use the terminal heavily in their daily work.”

http://www.linux.com/news/what-know-using-windows-10s-new-linux-system

“If you using the Linux command line at all, odds are you consider yourself a pro. Consequently, the Linux subsystem in Windows is hidden behind a”for pros only" side entrance that you can only get into if you’re running Windows 10 from the Fast Ring developer builds numbered 14316 or greater, via the Windows Insider program."

19 AT&T Adopts Canonical’s UbuntuIndexup to index

http://www.linkedin.com/groups/44746/44746-6093905096800821250

“AT&T Adopts Canonical’s Ubuntu in Push to Replace Proprietary Systems with Open-Source Tech: The deal means AT&T joins Wal-Mart, Amazon.com, Netflix and others using the open-source operating system in massive cloud computing infrastructures. Traditional companies”have to" adopt modern tech used by younger competitors, to keep up …"

20 Linux Is Everywhere – but is it Linux?Indexup to index

http://www.infoworld.com/article/3019852/linux/how-linux-won-without-winning.html

“Every time InfoWorld does a story that mentions Android’s market performance, like my recent article on how Android is displacing Windows in embedded devices, at least one Linux zealot posts a comment saying that Android is really Linux and that Linux is winning the platform war everywhere because of such adoption.”

“The fact is Linux makes it possible for developers to create OSes for all sorts of new things. That is cause enough for celebration by the Linux community, whether or not what the user sees is Linux itself.”

21 Linux Is Everywhere – Now There’s A Plan to Make It for EveryoneIndexup to index

http://www.wired.com/2016/01/linux-is-everywhere-now-theres-a-plan-to-make-it-for-everyone/

“Linux is everywhere these days. It runs our phones, the web servers that underpin everything from Facebook to Google, even our cars. That means there’s a bigger demand for people who know how to work with the operating system than ever before, and those jobs often pay good money.”

22 Linux summer jobs at NRCanIndexup to index

“Natural Resources Canada (NRCan) has re-engineered its science computing platforms and has acquired two supercomputers, including a Cray Xe6M and a high performance Linux cluster. This infrastructure services the needs of high profile scientific computing projects, including earth sciences modeling, seismic profiling, genomics, energy efficiency simulations and material science.

NRCan is looking for enthusiastic students to work closely with our scientists to migrate or implement their computing projects into the new supercomputers and take our computing to the next level. True supercomputing will bring real scalability and enable scientific experiments that were previously unattainable.

Developing software application code in the appropriate language to be executed on NRCan’s High Performance computers (CPU and GPU) such as Fortran, Python, C, C++ and R on Linux (CentOS 6.x+, RHEL 6.x+, Unbuntu 14.x+) and Windows Operating Systems."

http://emploisfp-psjobs.cfp-psc.gc.ca/psrs-srfp/applicant/page1760?view=844348

23 Turning everyone into a lifelong teacherIndexup to index

http://mag.e-180.com/2014/10/googles-education-evangelist-wants-to-know-what-the-heck-you-mean-by-virtual-learning/

“Whenever I get a chance to talk to kids, I go talk to kids. I don’t talk to them about,”Hey, what do you want to be when you grow up," or about education in general. What I ask them is, “What problems do you want to solve?” Sometimes it’s like “I want to fix the drug problem in my neighborhood”. Then I say, “What do you need to learn to help you solve that problem? And then go back to your school and demand that education.”

24 It’s Time to Think Like a GamerIndexup to index

http://www.psychologytoday.com/articles/201508/it-s-time-think-gamer

“When times are tough, doing what you’d do in a game—powering up, finding allies, and beating the bad guys – is a supremely powerful response. […] Hundreds of resilience studies show that there are at least seven ways of thinking and acting that make all the difference between buckling under extreme stress and flourishing despite it. And here’s where the science gets really exciting – at least for a game designer like me. It turns out that these powerful ways of thinking and acting are all ways that we commonly think and act when we play games”

25 Indian Government adopts open source for public officesIndexup to index

http://tuxdiary.com/2015/11/02/indian-govt-adopts-open-source/

“In a historic decision, the Indian Government has adopted open source for its public offices. With acclaimed Indian organizations like C-DAC (Centre for Development of Advanced Computing) and IIT Chennai working on Debian based distro BOSS Linux http://bosslinux.in/ and states like Tamil Nadu already advocating http://tuxdiary.com/2014/03/24/tn-govt-goes-open-source/ open source for a while, this was inevitable. The policy http://deity.gov.in/sites/upload_files/dit/files/policy_on_adoption_of_oss.pdf has been published by the Ministry of Communication & Information Technology today.”

26 Linux TrainingIndexup to index

http://training.linuxfoundation.org/images/lftc_evolution_sysadmin.jpg

Linux Sysadmin Evolution

27 Linux Career NewsIndexup to index

http://www.linuxfoundation.org/news-media/blogs/browse/2015/03/linux-growth-results-high-demand-linux-talent-fourth-year-row

“Linux Growth Results in High Demand for Linux Talent for Fourth Year in a Row”

28 Don’t blame Linux for the XOR botnetIndexup to index

http://www.infoworld.com/article/2990956/linux/dont-blame-linux-for-the-xor-botnet.html

“First, the fact that this botnet is built on compromised Linux systems is irrelevant. It says nothing at all about Linux or Linux system security – because those systems were compromised through brute-force attacks on open SSH ports. Those attacks were successful due in large part to simple passwords and poor security used by vendors pumping out cheap broadband routers.

Second, anyone who has run a Unix-based system on a public network for any length of time knows that brute-force login attempts occur constantly – and are easily thwarted. One such system I manage has drawn more than 27,000 unique brute-force attempts in the past few months. Another averages several hundred unique attempts a week. Of course, these attempts are heavily mitigated due to tools that detect and stop this kind of attack. Denyhosts and fail2ban monitor log files for persistent login attempts from unique IP addresses and block them at the network level so that they lose all access to whatever vector they were trying to compromise."

29 Automating Repetitive TasksIndexup to index

http://marcgg.com/blog/2015/09/30/automate-repetitive-tasks/

“Doing repetitive tasks is rarely fun. Because of this, you’re probably building frustration while working on them. In the long run this can be a problem. Once I’ve done the task a few dozens of times, it starts getting annoying. After hundreds of times, it seems like a complete waste of time and I might even get mad at the very idea of having to do it.”

30 China’s Linux-based replacement for WindowsIndexup to index

http://www.networkworld.com/article/2986696/microsoft-subnet/china-linux-based-replacement-for-windows-xp.html

NeoKylin – the name comes from “qilin,” a fictional chimera-like creature – is developed by China Standard Software, a subsidiary of China National Software & Service Co., Ltd., and is built on Linux. It already made its own Linux variant called NeoShine, but NeoKylin appears to be different. Quartz believes the OS is based on Fedora due to its use of Yellowdog Updater Modified (yum) package management.

31 You are being huntedIndexup to index

http://theintercept.com/2014/03/20/inside-nsa-secret-efforts-hunt-hack-system-administrators/

Across the world, people who work as system administrators keep computer networks in order – and this has turned them into unwitting targets of the National Security Agency for simply doing their jobs. According to a secret document provided by NSA whistleblower Edward Snowden, the agency tracks down the private email and Facebook accounts of system administrators (or sys admins, as they are often called), before hacking their computers to gain access to the networks they control.

http://www.rt.com/usa/nsa-hunt-sys-admins-369/

In its quest to take down suspected terrorists and criminals abroad, the United States National Security Agency has adopted the practice of hacking the system administrators that oversee private computer networks, new documents reveal.

32 Microsoft uses Linux to run its CloudIndexup to index

http://www.wired.com/2015/09/microsoft-using-linux-run-cloud/

“Microsoft has admitted to something that used to be unthinkable: using Linux to run some of its own operations. […] Microsoft had to build its own switch software – and it turned to Linux to do just that.”

Microsoft Linux

Microsoft Linux

33 Intel Active Management Technology considered harmfulIndexup to index

http://fsf.org/blogs/community/active-management-technology

Intel’s Active Management Technology (AMT) is a proprietary remote management and control system for personal computers with Intel CPUs. It is dangerous because it has full access to personal computer hardware at a very low level, and its code is secret and proprietary.

34 GNU Radio free software talks to ISEE-3Indexup to index

http://www.fsf.org/blogs/community/free-software-in-space-gnu-radio-and-the-isee-3-spacecraft

To do this, the group turned to GNU Radio, a free software toolkit for implementing software-defined radios and signal processing systems. Modifying the software to communicate in the 1970s satellite protocol, members of the reboot project were able to gain access to the spacecraft and fire its thrusters in early July

35 Someone deletes Toy Story 2 at PixarIndexup to index

http://www.youtube.com/watch?v=8dhp_20j0Ys

The backups were bad! Luck: An employee happened to have taken a copy home.

36 Data Centre technician unplugs running disksIndexup to index

DSL Reports pays $28,000 in data recovery fees after the technician unplugs the disks while they are still running: http://docs.google.com/document/d/1kll86bDn_MgWoo6Ja7oHo_yvI0SCqggEvNWwPWIcrHY/edit?pli=1

37 ISS Windows contaminated by virusIndexup to index

Most International Space Station [ISS] computers already run GNU/Linux:

GNU/Linux chosen as operating system of the International Space Station: Gnus now join astronauts of many countries in humanity’s biggest space station. This is a wise choice for the space station, and a high-profile victory for software freedom. It brings good publicity for free software, demonstrating its respected position in the world of science and technology.

They finally had to fix the laptops on the ISS:

Although Windows 8 offers built-in anti-virus software called Windows Defender, the ISS really needs an operating system that is less targeted for cyber-attacks than Windows, according to ExtremeTech. The ISS has already experienced the headache of having infected computers onboard after a Russian cosmonaut accidentally brought a laptop infected with the W32.Gammima.AG worm to the station, which ended up contaminating all the other laptops on the station.

The solution was to dump Windows in favour of Linux:

The United Space Alliance, which manages all of the space station’s computers in association with NASA, made the decision to migrate key functions from Windows to Linux, “because we needed an operating system that [is] stable and reliable,” Keith Chuvala of United Space Alliance said in a Linux Foundation press release.

See Also: ISS Robonaut 2 runs Linux

Most systems on the space station already use some form of Linux, including the Robonaut 2, which is expected to take over some of the “tasks too dangerous or mundane for astronauts in microgravity.” The R2 is already a Linux-bot, so both the on-board astronauts and the ground crew are trying to learn to use the platform to better communicate with the first humanoid robot in space.

http://rocketry.wordpress.com/2013/05/07/nasa-to-migrate-iss-computers-from-windows-to-linux/

http://www.fsf.org/blogs/community/gnu-linux-chosen-as-operating-system-of-the-international-space-station

Author: 
| Ian! D. Allen, BA, MMath  -  idallen@idallen.ca  -  Ottawa, Ontario, Canada
| Home Page: http://idallen.com/   Contact Improv: http://contactimprov.ca/
| College professor (Free/Libre GNU+Linux) at: http://teaching.idallen.com/
| Defend digital freedom:  http://eff.org/  and have fun:  http://fools.ca/

Plain Text - plain text version of this page in Pandoc Markdown format

Campaign for non-browser-specific HTML   Valid XHTML 1.0 Transitional   Valid CSS!   Creative Commons by nc sa 3.0   Hacker Ideals Emblem   Author Ian! D. Allen