Sie sind auf Seite 1von 3

1. GPFS !!!

2. Difference Real and Effective UID/GID ?


http://www.makelinux.net/alp/083
https://intelligea.wordpress.com/2014/02/11/effective-user-id-and-group-id-vs-real-user-id-and-g
roup-id/

3. Process accouting on linux


Psacct
http://desflow.nyc.deshaw.com/v/Sys/489069
http://desflow.nyc.deshaw.com/Q/Sys/333537#60
http://desflow.nyc.deshaw.com/Q/Sys/341933

3. Dirty Cow Explained


http://www.theregister.co.uk/2016/10/21/linux_privilege_escalation_hole/

4. Capability based security linux


https://www.insecure.ws/linux/getcap_setcap.html
https://en.wikipedia.org/wiki/Protection_ring
http://security.stackexchange.com/questions/67216/do-sudo-and-su-belong-to-capability-
based-security
https://en.wikipedia.org/wiki/Capability-based_security
https://www.kernel.org/pub/linux/libs/security/linux-privs/kernel-2.2/capfaq-0.2.txt
http://www.andy-pearce.com/blog/posts/2013/Mar/file-capabilities-in-linux/

5. man 5 proc : Explanation on proc filesystem


https://linux.die.net/man/5/proc

6. Major Minor numbers linux devices

7. LD_LIBRARY_PATH LD_PRELOAD

8. System Crash - Debugging


https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/ht
ml/Deployment_Guide/s2-kdump-crash-log.html
http://www.dedoimedo.com/computers/crash-analyze.html
http://www.dedoimedo.com/computers/crash.html
https://access.redhat.com/solutions/2647381

9. Process Dump - Debugging


10. Linux OOM killer
11. DKMS for GPFS module
12. Systemd
https://www.digitalocean.com/community/tutorials/understanding-systemd-units-and-unit-
files

13. Kerberos Ticket.

14. SysDig
http://www.sysdig.org/

15. DESCO TIME-Error utility sysmgmt

16. Emulate NUMA in KVM


https://pve.proxmox.com/wiki/Qemu/KVM_Virtual_Machines

17. Reboot in RHEL7

18. LDAP+AUtofs demo


19. CLustered NFS

20. Linux Mixed Pages


http://unix.stackexchange.com/questions/198542/what-happens-when-you-mount-over-an-existi
ng-folder-with-contents
http://askubuntu.com/questions/557733/ln-s-vs-mount-bind

SETUID/SUDO on scripts. Real/Effective UID and user environments needs to be explored


http://unix.stackexchange.com/questions/17567/how-to-safely-pass-variables-to-root-enabled-sc
ripts
Killing TCP connections linux

http://unix.stackexchange.com/questions/71940/killing-tcp-connection-in-linux

http://unix.stackexchange.com/questions/126971/ext3-if-block-size-is-4k-why-does-ls-l-show-file
-sizes-below-that

Das könnte Ihnen auch gefallen