David Both to present “SystemV Startup vs systemd” at TriLUG on May 8

I will be giving a presentation, “SystemV Startup vs systemd” at the TrilUG meeting on Thursday, May 8.

Topic: SystemD
Presenter: David Both
When: Thursday, 8th May 2014, 7pm (pizza from 6.45pm)
Where: NC State Engineering Building II Room 1021, Centennial Campus
Parking: The parking decks and Oval Drive street parking are free after 5pm
Website: http://trilug.org/2014-05-08/systemd

The new systemd daemon replaces the init process for some distributions already and is coming to many more. systemd provides service management and much more as well as startup for services designated to run on startup. It is designed to increase startup speeds as well as to conserve system resources by using a new startup strategy in which services are not started until they are actually required. This presentation will briefly review the Linux boot process and the old SystemV startup process. It will then discuss in more detail the startup process using systemd, and the reasons for creating the new systemd daemon and some of the advantages it provides. We will also discuss configuration files and some of the more common commands required to cause systemd to do our bidding. Backward compatibility will also be covered.

I hope to see you there.

Posted in Announcements, Linux, News | Comments Off

Dealing with the HeartBleed bug

It has been a very hectic couple days since I woke up Tuesday morning to the news about the so-called HeartBleed bug. I spent a good bit of time Tuesday exploring the available information and then creating a program that would do much of the work required to actually fix the problem, and then testing my program. I spent a good deal of Wednesday fixing the problem on the computers for which I have some responsibility.

I have taken a bit of a breather after all that and here is my assessment.

HeartBleed is the most serious bug ever

HeartBleed is a bug that is both dangerous and insidious. If you have a computer that is on the Internet, you must assume that your data has been stolen. Even worse, you have no way to know who has been stealing your data or for how long; this bug opens up your data in such a way that no trace of the crime is left behind.

There is even a web site dedicated to HeartBleed, that provides the gory details about this bug and its effects that is strictly factual and contains none of the hype required by alleged news organizations that are primarily entertainment and not information – infotainment.  Unfortunately, in this case, most of the hype seems to be deserved.

What it does

The HeartBleed bug does nothing by itself. It simply provides an open door to crackers (black hat hackers) who use that door to steal personal data. HeartBleed affects the OpenSSL library of security programs that are used by most computer systems. The bug allows access to the memory of the affected server.

When your computer connects to a web site that uses encryption, such as your bank, the OpenSSL code is used for communicating between your computer and the bank’s computer. When there is no activity for a period of time, OpenSSL produces a heartbeat, a simple transmission of a packet of data that says “I am still here” to the server that prevents the server from closing the connection before you are finished with your business and the server responds with a simple acknowledgement of that “ping.”

The crackers can use this by faking a heartbeat signal from your computer. The acknowledgement is sent back to the cracker’s computer and the cracker can then request data from the memory of the server. The memory leaked to the cracker can contain any or all of your personal data stored on that site.

The affected computers are the servers that run most of the websites in the world and that contain your medical, personal and financial data including your social security numbers, banking information and everything else you don’t want the bad guys to have access to.

The worst part is that you do not have to do anything to have your data stolen except to visit a web site you already trust like your bank.

Recovery

Almost every version of the OpenSSL library has been fixed. And most of the large organizations that have servers, such as banks and other financial institutions, eCommerce websites like, hopefully, Amazon, Google and so on, have already patched their web sites.

The first thing you should do is install the latest updates to your own computer(s) regardless of which operating system you use. If your operating system is too old for new updates, such as Windows 95 or XP, or Fedora Linux 18 or earlier, upgrade your operating system and install all of the current updates. If you need to upgrade your computer in order to upgrade your operating system, then do so.

Second, change all of the passwords you use on web sites. ALL OF THEM!  All of your passwords have been compromised. If you continue to use them your data will be stolen.

The real problem is in knowing whether the web sites you use and which have some of your sensitive data have been fixed. By this morning, Thursday, April 10, many have some sort of notice on their login page. In most cases the ones I see seem to say that they never had a problem.  But you cannot count on that. Many are ignoring it entirely. Just do the best you can. Change all of your passwords anyway. If you learn later that the web site did not fix the vulnerability until after you had changed your password, change it again.

A few password guidelines:

  • Never use the same password on multiple web sites. Thus if one site is compromised, you won’t have to change all of your passwords.
  • Use long passwords that are at least 8 characters in length. This makes it much more difficult to guess or crack your password.
  • Passwords should contain a combination of lower and upper case letters, numbers, and special characters. This makes it much more difficult to guess or crack your password.
  • Never use the same password twice. An old password that was hacked, if used over, can still be used to attack your account.
  • Do not use birth dates, Social Security Numbers, pet, friend or spouse names, or dictionary words for your passwords. This will make it much more difficult to social engineer your passwords.
  • Change your passwords frequently. At least every 90 days, but once a month is even better. This will limit the time of your vulnerability if a site is compromised.
  • Never write down your passwords. Ever.

Good security is hard work

Yes, good security is hard work. That is why companies hire a lot of expensive people to handle it for them. For end users, it also takes time and some creativity to come up with reasonable passwords that are safe but which can also be remembered. It will be frustrating.

Bad security is an even bigger hassle. It can cost you your identity, lots of money and a great deal of time and frustration – far more than good security will cost.

Posted in Critical Notifications, News, Security | Comments Off

Windows XP is dead – Long live Windows XP!

Windows XP will reach the end of life on April 8, 2014. This means that Microsoft will no longer provide security updates to ward off hordes of virii, Trojan horses, worms, spyware, bots, spamware, and any of the other forms of malware targeted at what has been the most ubiquitous operating system on the planet.

Microsoft has been trying to bribe, cajole and coerce users of XP — there is still a huge number of them — into upgrading to a more recent version of Windows.  But they are just concerned about the revenue stream and not about the safety and security of your computer systems.

Some users of XP are upgrading to newer versions of Windows but some are switching to Linux, in part because Linux is more secure and less expensive than any Windows operating system. However the vast majority of XP users are not doing anything because of huge masses of organizational inertia and lack of funding.

Many users, especially home users, are just going to stick with what they have because they have never worried about updates and have no clue that support is expiring, and would not care anyway if they did know.

My guess is that Windows XP will be around for many years, whether supported or not.

Another Y2K?

Security specialists around the world have been predicting the Winpocalypse in which every Windows XP system will become immediately infected and begin sending spam and malware to all of the other already infected XP systems. Some of the more alarmist predictions theorize the collapse of the Internet due to the mass attacks envisioned as a worst case scenario.

I am pretty certain that the worst of these Internet doomsday predictions are highly improbable. But that does not mean that there won’t be an impact. The Internet will be burdened with the effects of large amounts of traffic but, let’s face it, Windows XP is already a hotbed of infection. And not just XP; virtually every version of Windows out there, including Windows 7 and 8 are fairly easy targets for malware. Perhaps they are a bit less susceptible than XP, but that is simply saying that Windows 7 and 8 are better than XP because it takes a little more work to crack into them. It seems to me that lots of people get paid a lot of money to remove malware from those computers running more recent versions of Windows than XP.

Some media is covering this extensively, and the hyperbole is astounding. It might as well be Y2K again. Oh, wait! … that did not happen did it. Well, perhaps it did not happen because all of the programmers responsible for correcting that little issue before it did become a problem actually did a great job of it.

However there are no little programming tweaks that can be made to fix this issue. It is going to require a complete installation of a new operating system and most of the applications people are using will have to be upgraded with new versions as well. That will require new hardware in almost every case. So new Windows operating system, new applications and new hardware to run it all. It will all be very expensive.

And the old hardware will probably be given away, infestations and all, to people too poor or too ignorant about computers to do anything about replacing Windows XP, even if they had heard that there is a problem with it, or they will simply be scrapped and sent to third-world “recycling” centers in which the workers and the environment are slowly — or not so slowly — poisoned.

Option: Linux

Those of us who use Linux or Unix are not particularly worried about the safety or functionality of the systems for which we are responsible so long as we install security updates as they are made available. We are a bit concerned about the effect on the Internet as a functioning utility, and very seriously concerned about the people and ecosystems affected by tossing all those perfectly good computers into one trash heap or another even if the recyclable components are extracted and reused.

It is especially difficult to see really good computers being tossed when organizations are convinced by their support organizations, whether internal or especially external, that perfectly good computers need replacing and the old ones should be trashed. I see organizations discarding computers with really decent specifications that could be refurbished simply by installation of a decent operating system like Linux.

Sometimes, not frequently but sometimes, the “older” computers are given to schools and other non-profits and are used by children in schools too poor to purchase new computers for a bit of computer learning. Of course that does not make these computers free, because the Windows license does not transfer and they should not be using XP anyway. So schools have computers dumped on them in some cases with an old, unsupported OS that they cannot use, so they must — to be legal at least — purchase a newer version of Windows, and quite probably a memory upgrade to allow it to work reasonably well and get booted before class is over.

Here again, installing Linux on those computers will usually negate the need to purchase more memory and still save the cost of paying for an OS.

If you have some old Windows computers that you are considering replacements for, think first about upgrading them with Linux. You will very likely be amazed at the speed difference that Linux will make, and it will be free in the bargain. And that is a real bargain.

Posted in Commentary, News, Opinion, Rant, Security | Comments Off

More Linux Malware

In the last few days there have been a number of news stories about a couple new instances of malware designed for Linux.

First there was the story about the Linux Botnet. This particular Botnet consists of thousands of Linux servers that are being used to infect tens and hundreds of thousands of Windows desktops. The infected Linux web sites are used to infect the Windows desktops of visitors to the web sites. The Windows desktops are the ultimate targets here and are used in the standard ways to steal user information in order to empty their bank accounts.

There are more Linux servers on the Internet than all other types combined. In fact, Linux servers account for more than 65% of all servers on the Internet so they do make an attractive target.

Then there is also the article about “Linux worm Darlloz targets Intel architecture to mine digital currency” which has a target of routers and set-top boxes such as your DVR and wireless routers, most of which run Linux. This worm mines currencies other than Bitcoin but is still used to make money of some form for the hackers. It targets systems with an old Linux kernel.

This is an interesting bit of news as it indicates a higher awareness of Linux and a greater Linux presence making it a more interesting – and rewarding – target for the bad guys. These days the black hat hackers, officially known among the computer literati as “crackers,”  is all about “show me the money.”

Both of these bits of malware together have infected significantly fewer than 75,000 systems. Typical windows malware can infect millions of computers.

Easy Prevention

The most important part of this story is that neither  of these bits of malware can act alone. They both require the help of inept Linux administrators, although I hesitate to call anyone that stupid an administrator.

These bits of malware can only infect a Linux system that has not been properly kept up to date with security patches. For the routers and set-top boxes it is more about the simple task of changing the factory set administrator ID and password. It is amazing how many wireless routers are only protected by the default ID and password.

Prevention is simple. Set new administrative passwords for routers and set-top boxes, and keep your Linux computers up to date at least with security patches.

You can also check to see whether your Linux computers are infected by running a quick and easy command line program as described in the articles linked above.

Recovery

If your computer is infected, recovery is to completely reinstall your operating system from a known good source and restore your data from backups. You do back up don’t you? That is much easier and less time-consuming than attempting to recover by locating and fixing the infection itself.

Posted in Commentary, Linux malware, News, Security | Comments Off

Free “Introduction to Linux” course from the Linux Foundation, edX, MIT and Harvard

Free classes are always cool, especially in times when companies do not have big training budgets. And it seems like one of the best training opportunities in years is here.

Linux is hot as a job skill. The Linux Foundation’s 2014 Linux Jobs Report found that 90 percent of hiring managers are looking to hire Linux professionals in the next half-year. But demand is greater than supply. Not only is Linux hiring hot, but Linux professionals are also getting larger and more frequent pay raises.

The Linux Foundation along with edX and major educational institutions Harvard and MIT have combined to provide a Massive Open Online Course (MOOC), Introduction to Linux. This course is free of charge and you can take it to earn a certificate or you can audit the course if you cannot make the full time commitment.

The course will be available some time in the 3rd quarter of 2014. The folks at VentureBeat have a short writeup about this which sounds quite interesting. You can read about the course and register here. It is estimated that the time commitment if you take this course is 40 to 60 hours.

Now you might ask why, as a Linux trainer, I would suggest you take this course rather than mine? Well, free is free, right?

I do plan to take this class myself as there is always more to learn. I enjoy teaching my own two-day “Introduction to Linux” course, and I do get paid for it. So, again, why? Because I cannot imagine that anything done by the Linux Foundation and the combination of organizations that have put this course together would not be really, really good.

Opportunities like this do not come along frequently. Take advantage of it.

Posted in Linux, News, Training | Comments Off

Linux Security Bug – Update

The security bug is identified as CVE-2014-0092 now has fixes available for the following distributions of which I am certain.

  • CentOS
  • Debian
  • Fedora
  • Red Hat

Check your own distribution to verify the availability of the fix. Note that not all releases of these distros have a fix available yet. If your release does not have a fix for this bug you should seriously consider upgrading to a release that does.

Posted in News, Security | Comments Off

Serious security bug found in Linux

A very serious bug has been found in the Open Source GnuTLS package. Many programs and the Linux operating system itself use this package to deal with the encryption of data streams. The bug was discovered during a routine code audit by Red Hat, and appears to be a simple error by a programmer. This is as opposed to the flaw intentionally inserted into the cryptography algorithm by the NSA to enable them to eavesdrop on encrypted communications. The NSA flaw does not affect Linux.

This bug is identified as CVE-2014-0092.

The fix is available and I have explicitly confirmed that it has been included in an update for GnuTLS on CentOS that was made available this morning. I have installed it on my server and firewall here which all use CentOS and ensured that nothing else obvious is broken. I have no idea whether this update requires a reboot, but I will reboot all of the affected CentOS systems after the updates have been installed.

This fix is not yet available for Fedora. Check the updates for your own distribution to verify whether this fix has been included or not.

Part of the news here is that serious security bugs in Linux, as this one is, are few and far between so it gets heavy media coverage. The other part of the news, and the part that will get little or no coverage, is that it is only because the code is Open Source that Red Hat could perform an audit and discover the problem. The open source aspect of this code is also the reason that the fix is available so quickly after the problem is discovered, and the ease with which I can confirm that it is included in the new version of the GnuTLS package by looking at the changelog.

The link below goes into more detail, if you are interested.

http://arstechnica.com/security/2014/03/critical-crypto-bug-leaves-linux-hundreds-of-apps-open-to-eavesdropping/#p3

Posted in Linux, News, Security | Comments Off

Training Calendar set for first half of 2014

Millennium Technology Consulting LLC has finalized its Linux class schedules for the first half of 2014.


Training Calendar for First Half of 2014
Course Date Availability
Theory and Practice of Linux System Administration February 24 – 28  Seats available
Linux Servers and Advanced System Administration March 17 – 21  Seats available
Theory and Practice of Linux System Administration March 31 – April 4  Seats available
Linux Servers and Advanced System Administration April 14 – 18  Seats available
Theory and Practice of Linux System Administration April 28 – May 2  Seats available
Theory and Practice of Linux System Administration May 19 – 23  Seats available

Theory and Practice of Linux System Administration

This course is intended for trainee or  junior Linux Systems Administrators who wish to advance their knowledge, and administrators of other Unix versions or Windows who wish to become Linux System Administrators. This class is heavily oriented towards hands-on activities. At least half of the class time is allotted to lab projects. The class is based on CentOS because it is the downstream distribution for Red Hat Linux and is identical in every way except for branding.

Many of the more experienced Linux System Administrators who have taken this course also find it very valuable.

See the Theory and Practice of Linux System Administration page for a complete course description and prerequisites.

Linux Servers and Advanced System Administration

This course is intended for experienced Linux System Administrators who wish to learn advanced troubleshooting techniques and server installation and configuration. By the end of the class each student will have a fully working Linux system with a firewall; a name server with forward and reverse zones; a DHCP server; an email server with integrated anti-spam; two working web sites with one a static HTML site and the other a complete WordPress site with a MySQL back end; A MailMan mailing list server; A VNC server; NFS and Samba shares. The student will also learn to build RPM packages.

See the Linux Servers and Advanced System Administration  page for a complete course description and prerequisites.

Discounts

Discounts are available to members of the Triangle Linux Users Group (TriLUG) of $500 per class. You must have and show your TriLUG membership card to obtain this discount. This discount may be used in conjunction with other discount offers.

Custom Class Scheduling

Millennium Technology Consulting LLC can provide customized scheduling for classes. If you do not see a class scheduled within your desired time frame we can work with you to schedule one that meets your needs. We also offer on-site training at your location. Please contact us to schedule a class for you.

Register

Please contact us to register for classes as soon as possible. Our classroom facilities are very limited so class sizes are very small.

Posted in Linux, News, Training | Tagged , | Comments Off

Russian Teen Responsible for Target and Other Breaches

Windows Point of Sale Terminals Targeted

The Hacker News, a security website, has posted information indicating that a Russian teen wrote the BlackPOS crimeware used to infect Target, Neiman Marcus, and other retailers’ point of sale (POS) terminals.

Sergey Taraspov, the Russian teen who wrote the BlackPOS malware has sold at least 40 copies of his creation to various hacker groups for $1800 to $2000 per copy. One or more of those groups, probably associated with the Russian mob, was likely responsible for the actual attacks on large retailers.

The bad news is that BlackPOS was written in Visual Basic, or VB. That means that it can infect many of the Windows based POS systems in retail stores today. The likely targets are larger retailers because of the larger customer base they have, which makes the potential target value much higher.

Linux POS Terminals Unaffected

The good news is that BlackPOS was written in VB. This means that retailers who use Linux based POS systems are not vulnerable.

There are a good number of retailers who do use Linux for their POS terminals. Unfortunately they mostly do not publish that information so I cannot provide you with a list of those chains. Asking the sales clerk won’t give you any more information because they don’t know any more than the store managers do.

We can only hope that more and more retail stores choose Linux based POS terminals in the future. You may even wish to start asking the store managers just to let them know you are aware that Linux POS terminals are safer and that you prefer to shop in stores that use it. I do.

Posted in News, Security | Comments Off

Theory and Practice of Linux System Administration class, January 20 – 24

Millennium Technology Consulting LLC, will be running the highly reviewed class, Theory and Practice of Linux System Administration, the week of January 20 – 24.

About this Course

This course is intended for  junior and mid-level Linux Systems Administrators who wish to advance their knowledge, and administrators of other Unix versions or Windows who wish to become Linux System Administrators. This class is heavily oriented towards hands-on activities. At least half of the class time is allotted to lab projects.  Experienced Linux System Administrators also find this class valuable. Taken from my own experiences accumulated during more than 15 years of using Linux, and developed using my knowledge and experience as a course developer and trainer for both IBM, Red Hat, and other companies, this class covers the practical aspects of Linux System Administration. It builds upon the foundation of the “Philosophy of Linux” in a way that helps the student understand how and why things are done as they are.

Our courses are always highly rated and well reviewed. Here are some comments from previous students taken directly from the course evaluation forms.

Course Description

The student will learn about the history of Linux and the philosophy of Linux and how it applies to the everyday tasks that she will be expected to perform. The student will install a current CentOS Linux system on common Intel hardware, using various installation options to customize the final result. The students will learn to use the command line interface (CLI) and many basic Linux commands along with the vi editor. More advanced commands such as sed and awk will be covered and combining all of these commands into short command line programs will be discussed and the student will have opportunity to use them in lab projects.

This course covers the Linux boot sequence and the traditional SystemV init scripts as well as an introduction to the new systemd daemon for startup and daemon management. The student will learn to manage users and software packages. Networking, security, processes, filesystems and Logical Volume Management will be covered in detail.

For complete details of this course see the Theory and Practice of Linux System Administration page.

Posted in Linux, News, Training | Tagged , , , | Comments Off

Saved by a bug! RSA encryption sucks.

I am sure you have heard about the intentionally flawed encryption algorithm pretty much thrust upon major companies by threats or greed that allows the NSA to eavesdrop on your encrypted communications. So no matter that you have encrypted your email transmissions, or your SSH (Supposedly Secure SHell) connection with other computers, the NSA can spy on you.

The so-called security company, RSA, which is now a subsidiary of EMC, was paid $10M to embed a — less than — random number generator in its encryption code that makes it easy for the NSA to crack the encryption on pretty much anything that used the RSA code during encryption.  So any software that uses the RSA code is free and easy pickings to the NSA. And if you paid for that RSA code, which you did in one way or another, you paid RSA and the NSA to steal your own information.

Most companies including RSA are now backing off the use of this algorithm.

Be sure to note that this information ONLY became available because of the Edward Snowden leaks. You are personally more secure today because of Edward Snowden.

OpenSSL saved by a bug

Open Source software does not use the RSA random number generator.

While this is a good thing, it is actually due to a bug that prevents the use of the specific type of random number generation algorithm used by the RSA code, Dual Elliptic Curve Deterministic Random Bit Generator (Dual EC DRBG).  This bug has been designated as WONTFIX to ensure that it does not get fixed in the future.

So, if you are using Open Source Software such as Linux, which uses the OpenSSL encryption libraries, your data is safe when encrypted and, by accident, always has been. But despite the wrong reason for this higher level of security than that provided by the companies providing proprietary code, it was easy with Open Source code to determine that this is the case. Anyone can look at the Open Source code and make this determination. No one can do that with the proprietary, closed code provided by RSA.

Be sure to take some of the links in the documents I have linked to here to see the full extent of this issue as well as to get more information about the random number generator algorithm itself.

Posted in Commentary, Opinion, Security | Comments Off

Theory and Practice of Linux System Administration class, November 11 – 15

For the last time this year, Millennium Technology Consulting LLC, will be running the highly reviewed class, Theory and Practice of Linux System Administration, the week of November 11 – 15.

About this Course

This course is intended for  junior and mid-level Linux Systems Administrators who wish to advance their knowledge, and administrators of other Unix versions or Windows who wish to become Linux System Administrators. This class is heavily oriented towards hands-on activities. At least half of the class time is allotted to lab projects.  Experienced Linux System Administrators also find this class valuable.Taken from my own experiences accumulated during more than 15 years of using Linux, and developed using my knowledge and experience as a course developer and trainer for both IBM and Red Hat, this class covers the practical aspects of Linux System Administration. It builds upon the foundation of the “Philosophy of Linux” in a way that helps the student understand how and why things are done as they are.

Our courses are always highly rated and well reviewed. Here are some comments from previous students taken directly from the course evaluation forms.

Course Description

The student will learn about the history of Linux and the philosophy of Linux and how it applies to the everyday tasks that she will be expected to perform. The student will install a current Fedora Linux system on common Intel hardware, using various installation options to customize the final result. The students will learn to use the command line interface (CLI) and many basic Linux commands along with the vi editor. More advanced commands such as sed and awk will be covered and combining all of these commands into short command line programs will be discussed and the student will have opportunity to use them in lab projects.

This course covers the Linux boot sequence and the traditional SystemV init scripts as well as an introduction to the new systemd daemon for startup and daemon management. The student will learn to manage users and software packages. Networking, security, processes, filesystems and Logical Volume Management will be covered in detail.

For complete details of this course see the Theory and Practice of Linux System Administration page.

Posted in Announcements, Linux, Training | Comments Off

How often do you reboot Linux servers?

One of the LinkedIn groups I belong to, Linux Users, had this question posed as a discussion.

How often do you … reboot the Linux servers?

 

The responses were all good, but I thought one in particular to be very interesting and quite an illustration of the rock-solid stability of Linux. Read it for yourself below, and you can also see the entire discussion at the link above.

 

Reprinted with permission of Fred Moore.
Security Consulting (physical/electronic), Security Design and review, Project Management, Sales

Other than a kernel upgrade there are very few reasons to restart a server. I once had Debian workstation running for 5 years and 2 months, never powered down, never rebooted, till we lost power for 5 days after a hurricane.

This is not windows, very few experienced sys admins reboot servers, as you can restart any service at any time (a few exceptions). I once had a customer that lost a server for several years, it was still functioning, they still had access, it was accessed daily, was still running the access control system between cities, They knew it was on premises, because they could kill the port on the switch, and it would stop. However they could not do a physical inventory, kinda made them crazy, They had 50+ servers running, they finally found it. During a remodel of the data center (two years prior), one night the contractor had closed it in behind some drywall. At the time this was their only Linux box, everything else was windows. Upon finding the server, they converted 90% of the windows boxes within a year. This was a management mandate, they now have 40% less sysadmins… Fred

People have been fired for rebooting a production server without advanced planning and notification. Fred

Posted in Linux | Comments Off

Linux jobs surge; salaries up 9%

Ninety-three percent of companies surveyed plan to hire Linux talent within six months. The article on ZDNet, “Survey shows companies need Linux talent and they need it bad,” also shows the same survey indicates that 90% of hiring managers are finding it difficult to locate good Linux talent.

In order to take advantage of these fantastic job opportunities available in the Linux world, many people will need training. And many companies will want to provide advanced Linux training for current employees.

Our Training

Millennium Technology Consulting LLC provides Linux administration training from a two day introductory class to in-depth classes that cover everything from the Linux boot process, Linux file systems, Logical Volume Management, and managing processes to setting up an email server with spam blocking, configuring a web server and problem solving.

Millennium Technology Consulting LLC provides in-depth Linux training for System Administrators. My courses are tailored to the System Administrator who needs to get the job done on a daily basis. They also provide an excellent groundwork for System Administrators who are interested in pursuing any type of Linux Certification. These are not certification courses or certification preparatory courses.

All of these courses are developed in-house and draw upon my own experiences accumulated during more than 15 years of using Linux. They are created using my knowledge and experience as a course developer and trainer for both IBM and Red Hat. These classes cover the practical aspects of Linux System Administration. They build upon the foundation of the “Philosophy of Linux” in a way that helps the student understand how and why things are done as they are.

Current Class Schedule

See our Training Class Calendar for a complete schedule of classes.

Custom schedules can also be accommodated. Please contact us to schedule a class for you. There is no extra charge for custom scheduling.

Course Descriptions

These courses are always highly rated and well reviewed. Here are some comments taken directly from the course evaluation forms.

Introduction to Linux

Introduction to Linux – This 2-day course is available and costs $1295.00.

This course is a quick survey of various aspects of using Linux with both the desktop and the command line interface (CLI). It is intended to be an introduction to Linux for someone who intends to be more than a casual user of Linux and covers some basic non-privileged administrative tasks. It also introduces a few of the basic concepts and some of the basic tools used by the root user.

See the Introduction to Linux page for a complete course description and prerequisites.

This 2-day course costs $1295.00.

See our Training Class Calendar for class dates for Introduction to Linux.

Theory and Practice of Linux System Administration

Theory and Practice of Linux System Administration – This 5-day course is available and costs $2495.00.

This course is intended for trainee or  junior Linux Systems Administrators who wish to advance their knowledge, and administrators of other Unix versions or Windows who wish to become Linux System Administrators. This class is heavily oriented towards hands-on activities. At least half of the class time is allotted to lab projects.

Students attending this class have a choice of which distribution on which they wish to concentrate and to use for lab projects. This class can be based either on Fedora because it is the upstream distribution for Red Hat Enterprise Linux (RHEL) and provides some insight into features and functions that may show up in RHEL in the future, or on CentOS as it reflects the current state of RHEL.

Many of the more experienced Linux System Administrators who have taken this course also find it very valuable.

See the Theory and Practice of Linux System Administration page for a complete course description and prerequisites.

This 5-day course costs $2495.00.

See our Training Class Calendar for class dates for Theory and Practice of Linux System Administration.

Linux Servers and Advanced System Administration

Linux Servers and Advanced System Administration – This 5-day course is available and costs $2995.00.

This course is intended for experienced Linux System Administrators who wish to learn advanced troubleshooting techniques and server installation and configuration. By the end of the class each student will have a fully working Linux system with a firewall; a name server with forward and reverse zones; a DHCP server; an email server with integrated anti-spam; two working web sites with one a static HTML site and the other a complete WordPress site with a MySQL back end; A MailMan mailing list server; A VNC server; NFS and Samba shares. The student will also learn to build RPM packages.

See the Linux Servers and Advanced System Administration  page for a complete course description and prerequisites.

This 5-day course costs $2995.00.

See our Training Class Calendar for class dates for Linux Servers and Advanced System Administration.

New course materials cover CentOS too

The new course materials for all courses developed by Millennium Technology Consulting LLC will cover both Fedora and CentOS. This means that presentation slides will cover those differences between distributions that are significant and meaningful. Lab projects will provide instructions for both distributions where differences exist in the commands or the tasks required to meet an objective.

The instructor will be able to teach classes using either CentOS or Fedora as the primary distribution depending upon the needs of the students and the measure of the differences between the two distributions. The instructor can then cover the differences between CentOS and Fedora in as much detail as there is time and need for.

And after the class is over, the course materials can be used as a reference for both distributions.

So whether you need to prepare for what the future of Linux holds, or you need to know exactly how to do things with today’s distributions, Millennium Technology Consulting LLC can meet your training needs.

Discounts

Discounts are available to members of the Triangle Linux Users Group (TriLUG) of $500 per class. You must have and show your TriLUG membership card to obtain this discount. This discount may be used in conjunction with other discount offers.

Custom Class Scheduling

Millennium Technology Consulting LLC can provide customized scheduling for classes. If you do not see a class scheduled within your desired time frame we can work with you to schedule one that meets your needs. We also offer on-site training at your location. Please contact us to schedule a class for you.

See our Training Class Calendar for current class dates.

Posted in Jobs, Linux, News, Training | Comments Off

Ultimate Open Source Attitude

When a company has a great product they usually protect it with patents and copyrights. In the case of proprietary software, products are also protected with secrecy and extremely restrictive licensing. Can you say “Software police”?

Red Hat, the company responsible for the world’s most ubiquitous version of Linux takes a different view. They embrace the clones such as CentOS and exemplify the ultimate Open Source attitude in the process.

http://readwrite.com/2013/08/13/red-hat-ceo-centos-open-source#awesm=~ogzo52UiDLvhxf

The above link is an extremely interesting story about how — and why — Red Hat embraces CentOS in particular, and other clones of Red Hat Enterprise Linux (RHEL).

Posted in Articles, Freedom, Linux, Open Source Software | Comments Off
« Older