This commit is contained in:
crowner 2013-12-02 22:59:01 +08:00
commit eb66f0e3d9
9 changed files with 172 additions and 163 deletions

View File

@ -1,96 +0,0 @@
NearTan 选题
How to setup EPEL repository on CentOS 5/6
================================================================================
What is EPEL repository
EPEL (Extra Packages for Enterprise Linux) is a project from the Fedora group that maintains a repository of software packages that are not already present on RHEL/CentOS. The repository is compatible with RHEL and all close derivates like CentOS and Scientific Linux.
By using epel we can easily install many packages (around 10,000) with yum command, that are not already present in the centos repositories. EPEL packages are usually based on their Fedora counterparts and will never conflict with or replace packages in the base Enterprise Linux distributions.
Further details about the epel project are available at
[https://fedoraproject.org/wiki/EPEL][1]
So in this tutorial I am going show you how to setup the epel repositories on CentOS
> Note - There are many different 3rd party repositories that provide software packages for RHEL/CentOS systems. Some of the most popular ones are RpmForge, RpmFusion, EPEL, Remi etc.
>
> However it should be always kept in mind, that if multiple such third party repositories are added to a system, then it can lead of conflicts. The same package can come from multiple repositories, and some repositories can replace base packages of a system leading to unexpected troubles. Rpmforge and Epel are known to have conflicts.
>
> There are advanced techniques to tackle this like setting up priorities, or selectively installing packages from repositories, but ofcourse these require a lot of effort and so if you are not sure about all this, it is recommended to only use 1 such external repository.
### Install EPEL on CentOS ###
To setup epel on centos, we need to download the epel installation rpm and install it.
The downloads pages for version 6.x and 5.x of CentOS/RHEL are the following
[http://download.fedoraproject.org/pub/epel/6/i386/repoview/epel-release.html][2]
[http://download.fedoraproject.org/pub/epel/5/i386/repoview/epel-release.html][3]
The above urls would probably redirect to country specific mirrors for faster download. The page would contain a download link to download the rpm directly. The direct download links are
[http://download.fedoraproject.org/pub/epel/6/i386/epel-release-6-8.noarch.rpm][4]
[http://download.fedoraproject.org/pub/epel/5/i386/epel-release-5-4.noarch.rpm][5]
Select the correct url depending on your centos version.
Note that the EPEL installer package is architecture independant, so can be installed on both x86 and x64 systems.
### 1. Check your CentOS version ###
First check your centos version with the following command
$ cat /etc/redhat-release
CentOS release 6.4 (Final)
### 2. Download EPEL rpm ###
Now download the epel rpm file for the corresponding centos version from one of the urls given above.
$ wget http://download.fedoraproject.org/pub/epel/6/i386/epel-release-6-8.noarch.rpm
### 3. Install the EPEL rpm ###
Now install the epel package with the rpm command
$ sudo rpm -ivh epel-release-6-8.noarch.rpm
or
$ sudo rpm -ivh epel-release*
### 5. Check EPEL repository ###
After installing the epel repository, check that it has been added to the repository list with the yum command
# yum repolist
Loaded plugins: fastestmirror
Loading mirror speeds from cached hostfile
* base: mirrors.vonline.vn
* epel: buaya.klas.or.id
* extras: centos-hn.viettelidc.com.vn
* updates: mirrors.fibo.vn
repo id repo name status
base CentOS-6 - Base 6,381
epel Extra Packages for Enterprise Linux 6 - x86_64 10,023
extras CentOS-6 - Extras 13
nginx nginx repo 47
updates CentOS-6 - Updates 1,555
repolist: 18,019
The epel is listed after base repo and provides around 10K packages. So epel is now setup on CentOS.
The epel repository is setup in the **/etc/yum.repos.d/epel.repo** file.
Now install something from the epel repository
$ sudo yum install htop
--------------------------------------------------------------------------------
via: http://www.binarytides.com/setup-epel-repository-centos/
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
[1]:https://fedoraproject.org/wiki/EPEL
[2]:http://download.fedoraproject.org/pub/epel/6/i386/repoview/epel-release.html
[3]:http://download.fedoraproject.org/pub/epel/5/i386/repoview/epel-release.html
[4]:http://download.fedoraproject.org/pub/epel/6/i386/epel-release-6-8.noarch.rpm

View File

@ -1,3 +1,4 @@
icybreaker translating
Insights into top 3 IT skill groups in highest demand
================================================================================
![](http://www.linuxcareer.com/images/linux_it_skills_watch.png)
@ -58,4 +59,4 @@ via: http://www.linuxcareer.com/insights-into-top-3-it-skills-groups-in-highest-
[1]:http://www.linuxcareer.com/it-skill-sets
[2]:http://www.linuxcareer.com/images/Linux_jobs_classification_jul_oct_2013.png
[3]:http://www.r-project.org/
[3]:http://www.r-project.org/

View File

@ -1,3 +1,4 @@
(translating by whatever1992)
Install Oracle Java 7 in Elementary OS Luna Via PPA
================================================================================
**Question**: How can I install Oracle Java 7 in Elemetary OS Luna?

View File

@ -1,3 +1,5 @@
我不入监狱  谁入监狱
Setup a jailed shell with jailkit on ubuntu
================================================================================
### Jailed Shell and Jailkit ###
@ -216,4 +218,4 @@ via: http://www.binarytides.com/setup-jailed-shell-jailkit-ubuntu/
[9]:
[10]:
[11]:
[12]:
[12]:

View File

@ -1,25 +0,0 @@
这个不错  我要占坑
Test your reflexes with Briquolo, fast breakout game
================================================================================
[Briquolo][2] is a fast captivating breakout game that adopts the classic enjoyable game of dealing with a ball, in order to destroy various objects.
Briquolo comes with an agile nature, therefore, the gamer is to be attentive while reflecting back the ball, a second of inattention and the ball is lost.
Launching the game, the user is to notice its 3D look, the brave board is moved on top of a colorful environment featuring 3D objects, game arena where power-ups prove themselves vital, not succeeding to get the board-increasing goodies, the gamer decreases one's ability to complete the stage against the sprint-like attribute of the ball.
Pleasant effects, according-to music and tweakable options (including the ability to set the game in fullscreen mode with high resolutions,--including 1920x1080--) present Briquolo as entertaining and challenging.
![](http://iloveubuntu.net/pictures_me/Briquolo%20usc.jpg)
Briquolo 0.5.7 is freely [available][2] for installation via Ubuntu Software Center (Ubuntu 12.04, Ubuntu 12.10, Ubuntu 13.04, Ubuntu 13.10, Ubuntu 14.04).
--------------------------------------------------------------------------------
via: http://iloveubuntu.net/test-your-reflexes-briquolo-fast-breakout-game
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
[1]:http://briquolo.free.fr/en/
[2]:apt://briquolo

View File

@ -1,40 +0,0 @@
[this is bazz2, if you wanna translate this article, no way :P]
This new worm targets Linux PCs and embedded devices
================================================================================
**The malware spreads by exploiting a 2012 vulnerability in PHP, Symantec researchers said**
IDG News Service - A new worm is targeting x86 computers running Linux and PHP, and variants may also pose a threat to devices such as home routers and set-top boxes based on other chip architectures.
According to security researchers from Symantec, the malware spreads by exploiting a vulnerability in php-cgi, a component that allows PHP to run in the Common Gateway Interface (CGI) configuration. The vulnerability is tracked as CVE-2012-1823 and was patched in PHP 5.4.3 and PHP 5.3.13 in May 2012.
The new worm, which was named Linux.Darlloz, is based on proof-of-concept code released in late October, the Symantec researchers said Wednesday in a [blog post][1].
"Upon execution, the worm generates IP [Internet Protocol] addresses randomly, accesses a specific path on the machine with well-known ID and passwords, and sends HTTP POST requests, which exploit the vulnerability," the Symantec researchers explained. "If the target is unpatched, it downloads the worm from a malicious server and starts searching for its next target."
The only variant seen to be spreading so far targets x86 systems, because the malicious binary downloaded from the attacker's server is in ELF (Executable and Linkable Format) format for Intel architectures.
However, the Symantec researchers claim the attacker also hosts variants of the worm for other architectures including ARM, PPC, MIPS and MIPSEL.
These architectures are used in embedded devices like home routers, IP cameras, set-top boxes and many others.
"The attacker is apparently trying to maximize the infection opportunity by expanding coverage to any devices running on Linux," the Symantec researchers said. "However, we have not confirmed attacks against non-PC devices yet."
The firmware of many embedded devices is based on some type of Linux and includes a Web server with PHP for the Web-based administration interface. These kinds of devices might be easier to compromise than Linux PCs or servers because they don't receive updates very often.
Patching vulnerabilities in embedded devices has never been an easy task. Many vendors don't issue regular updates and when they do, users are often not properly informed about the security issues fixed in those updates.
In addition, installing an update on embedded devices requires more work and technical knowledge than updating regular software installed on a computer. Users have to know where the updates are published, download them manually and then upload them to their devices through a Web-based administration interface.
"Many users may not be aware that they are using vulnerable devices in their homes or offices," the Symantec researchers said. "Another issue we could face is that even if users notice vulnerable devices, no updates have been provided to some products by the vendor, because of outdated technology or hardware limitations, such as not having enough memory or a CPU that is too slow to support new versions of the software."
To protect their devices from the worm, users are advised to verify if those devices run the latest available firmware version, update the firmware if needed, set up strong administration passwords and block HTTP POST requests to -/cgi-bin/php, -/cgi-bin/php5, -/cgi-bin/php-cgi, -/cgi-bin/php.cgi and -/cgi-bin/php4, either from the gateway firewall or on each individual device if possible, the Symantec researchers said.
--------------------------------------------------------------------------------
via: http://www.computerworld.com/s/article/9244409/This_new_worm_targets_Linux_PCs_and_embedded_devices?taxonomyId=122
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
[1]:http://www.symantec.com/connect/blogs/linux-worm-targeting-hidden-devices

View File

@ -0,0 +1,101 @@
如何在CentOS 5/6上安装EPEL 源
================================================================================
ps:这篇翻得很吃力,麻烦校对大人了 ToT
ps2:原文第五个链接失效,已修正)
EPEL 是什么?
EPEL (Extra Packages for Enterprise Linux) 是Fedora 小组维护的一个项目。这个项目是一个软件仓库为RHEL/CentOS 提供他们所不默认提供的软件包。这个源兼容RHEL 和像CentOS 和Scientific Linux 这样所有由其衍生出来的版本。
我们可以轻易地通过yum 命令从EPEL 源上获取上万个在CentOS 自带源上没有的软件。EPEL 提供的软件包大多基于Fedora 不会与企业版Linux 发行版本的软件发生冲突或互相替换文件。
更多关于EPEL 项目的细节可以到以下网站获取。
[https://fedoraproject.org/wiki/EPEL][1]
在文本中我将展示在CentOS 下如何安装EPEL 源
> 提示 - RHEL/CentOS 系统有着太多的第三方源比较流行的比如RpmForge RpmFusion EPEL Remi等等。
>
> 然而需要时刻注意的是如果系统添加了多个第三方源可能会因此产生冲突——一个软件包从多个源获取一些源会替换系统的基础软件包可能会产生意想不到的错误。已知的就有Rpmforge 与EPEL 会产生冲突。
>
>
> 对于这些问题我们建议,调整源的优先权或者有选择性的安装源,但是这需要复杂的操作,如果你不确定如何操作,我们推荐你只安装一个第三方源。
### 在CentOS 上安装EPEL ###
要想安装EPEL我们先要下载EPEL 的rpm安装包。
CentOS/RHEL 下的6.x 和5.x 版本下载页面如下
[http://download.fedoraproject.org/pub/epel/6/i386/repoview/epel-release.html][2]
[http://download.fedoraproject.org/pub/epel/5/i386/repoview/epel-release.html][3]
以上网址可能会为了获取更快的下载速度被重定向到特地的镜像站。这页面包含可以直接获取到rpm 包的下载链接。直接的下载链接如下
[http://download.fedoraproject.org/pub/epel/6/i386/epel-release-6-8.noarch.rpm][4]
[http://download.fedoraproject.org/pub/epel/5/i386/epel-release-5-4.noarch.rpm][5]
根据你的CentOS 版本来选择正确的下载地址。
请注意EPEL 的安装包是独立编译的所以它可以安装在32位和64位系统中。
### 1. 确认你的CentOS 的版本 ###
首先通过以下命令确认你的CentOS 版本
$ cat /etc/redhat-release
CentOS release 6.4 (Final)
### 2. 下载EPEL 的rpm 安装包 ###
现在从上面的地址下载CentOS 版本所对应的EPEL 的版本
$ wget http://download.fedoraproject.org/pub/epel/6/i386/epel-release-6-8.noarch.rpm
### 3. 安装EPEL ###
通过以下命令安装EPEL 软件包
$ sudo rpm -ivh epel-release-6-8.noarch.rpm
or
$ sudo rpm -ivh epel-release*
### 5. 检查EPEL 源 ###
安装好EPEL 源后用yum 命令来检查是否添加到源列表
# yum repolist
Loaded plugins: fastestmirror
Loading mirror speeds from cached hostfile
* base: mirrors.vonline.vn
* epel: buaya.klas.or.id
* extras: centos-hn.viettelidc.com.vn
* updates: mirrors.fibo.vn
repo id repo name status
base CentOS-6 - Base 6,381
epel Extra Packages for Enterprise Linux 6 - x86_64 10,023
extras CentOS-6 - Extras 13
nginx nginx repo 47
updates CentOS-6 - Updates 1,555
repolist: 18,019
EPEL 已经在repo 后列出并且显示提供了上万个软件包所以EPEL 已经安装到你的CentOS了。
EPEL 源已经安装到**/etc/yum.repos.d/epel.repo** 文件。
现在来试一下从EPEL 获取软件包
$ sudo yum install htop
--------------------------------------------------------------------------------
via: http://www.binarytides.com/setup-epel-repository-centos/
译者:[NearTan](https://github.com/NearTan) 校对:[校对者ID](https://github.com/校对者ID)
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
[1]:https://fedoraproject.org/wiki/EPEL
[2]:http://download.fedoraproject.org/pub/epel/6/i386/repoview/epel-release.html
[3]:http://download.fedoraproject.org/pub/epel/5/i386/repoview/epel-release.html
[4]:http://download.fedoraproject.org/pub/epel/6/i386/epel-release-6-8.noarch.rpm
[5]:http://download.fedoraproject.org/pub/epel/5/i386/epel-release-5-4.noarch.rpm

View File

@ -0,0 +1,26 @@
用Briquolo,打砖块游戏,测试你的反应速度
================================================================================
[Briquolo][2]是一款快速而又迷人的游戏,处理一个球来破坏不同的物体,经典而又令人愉悦。
Briquolo十分考验敏捷因此游戏玩家必需时刻注意球的走向一不留神就可能让球掉落。
启动游戏后玩家会意识到这是一款3D游戏以3D对象展现的华丽木块浮动在一个多彩的环境里当击破木块时有机率掉落特殊物体毫无疑问获取它们是至关重要的会改变球或滑板的状态比如球会加速但有时候也会给你带来麻烦。
通过音乐和其他选项的修改,到达精致的效果(包括游戏全屏,高分辨率,--可调至1920×1080--)呈现一个有趣而又富有挑战性的Briquolo。
![](http://iloveubuntu.net/pictures_me/Briquolo%20usc.jpg)
Briquolo 0.5.7是[可靠的][2]自由软件,可通过Ubuntu软件中心安装(Ubuntu 12.04, Ubuntu 12.04, Ubuntu 13.04, Ubuntu 13.10, Ubuntu 14.04)。
--------------------------------------------------------------------------------
via: http://iloveubuntu.net/test-your-reflexes-briquolo-fast-breakout-game
译者:[Luoxcat](https://github.com/Luoxcat) 校对:[校对者ID](https://github.com/校对者ID)
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
[1]:http://briquolo.free.fr/en/
[2]:apt://briquolo

View File

@ -0,0 +1,39 @@
新蠕虫能感染 Linux 系统和嵌入式设备!
================================================================================
**来自𧶼门铁克研究员的消息这个病毒通过2012年出现的 PHP 漏洞传播**
据美国国际数据集团IDG的新闻 —— 一个新的蠕虫病毒将目标指向那些运行了 Linux 和 PHP 的 x86 架构计算机,其变种还会对运行在其他芯片架构上的设备(诸如家用路由器和机顶盒)造成威胁。
根据𧶼门铁克研究员的介绍,这种病毒利用 php-cgi 上的一个漏洞进行传播,这个 php-cgi 组件的功能是允许 PHP 代码在通用网关接口CGI的配置环境下被执行。此漏洞的代号为 CVE-2012-1823通过这个漏洞攻击者可以远程执行任意代码所以这个漏洞又叫“程任意代码执行漏洞” —— 译者注。2012年5月份PHP 5.4.3 和 PHP 5.3.13 这两个版本被打上补丁,修复了这个漏洞。
这个𧶼门铁克的研究员在[博客][1]中写道这个名为“Linux.Darlloz”的新蠕虫病毒基于去年10月份放出的 PoC 代码PoCproof of concept概念验证。利用目标计算机的漏洞为对其进行攻击而设计的代码称为 exploit而一个没有充分利用漏洞的 exploit就是 PoC —— 译者注)。
“在传播过程中,这段蠕虫代码会随机产生 IP 地址,通过特殊途径,利用普通的用户名密码发送 HTTP POST 请求,探测漏洞”,研究员解释道:“如果一个目标没有打上 CVE-2012-1823 的补丁,这台机器就会从病毒服务器下载蠕虫病毒,之后寻找下一个目标。”
这个唯一的蠕虫变种目前为止只感染了 x86 系统,这是因为这个病毒的二进制格式为 Intel 架构下的 ELF Executable and Linkable Format格式。
然而这个研究员警告说,黑客也为其他架构开发了病毒,包括 ARMPPCMIPS 和 MIPSEL。
这些计算机架构主要用于诸如家用路由器、网络监视器、机顶盒以及其他嵌入式设备。
“攻击者显然试图在最大范围内感染运行 Linux 的设备”,研究员又说:“然而我们还没有证实他们有没有攻击非 PC 设备。”
很多嵌入式设备的固件都使用 Linux 作为操作系统,并且使用 PHP 作为 Web 服务管理界面。这些设备比 PC 机 或服务器更容易被攻陷,因为它们不会经常更新软件。
在嵌入式设备为一个漏洞打上补丁,从来都不是件容易的事。很多厂商都不会定期公布更新信息,而当他们公布时,用户也不会被告知说这些更新解决了哪些安全问题。
并且,在嵌入式设备上更新软件比在计算机上需要更多的工作,以及更多的技术知识。用户需要知道哪些网站能提供这些更新,然后下载下来,通过 Web 界面更新到他们的设备中。
“很多用户也许压根就不知道他们家里或办公室的设备存在漏洞,”啰嗦的研究员说:“我们面临的另一个问题是,即使用户注意到他们用的是有漏洞的设备,这些设备的供应商却没有提供补丁,原因是技术落后,或者完全就是硬件的限制:内存不足,或 CPU 太慢,不足以支持这些软件的新版本。”
“为了保护他们的设备免受蠕虫感染,用户需要确认这些设备是否运行在最新的固件版本上,必要的话,升级固件,设置高强度的管理员密码,在防火墙那儿,或任何独立的设备那儿,屏蔽任何对 -/cgi-bin/php, -/cgi-bin/php5, -/cgi-bin/php-cgi, -/cgi-bin/php.cgi and -/cgi-bin/php4 的 HTTP POST 请求。”没完没了的𧶼门铁克研究员说道。
--------------------------------------------------------------------------------
via: http://www.computerworld.com/s/article/9244409/This_new_worm_targets_Linux_PCs_and_embedded_devices?taxonomyId=122
译者:[bazz2](https://github.com/bazz2) 校对:[校对者ID](https://github.com/校对者ID)
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
[1]:http://www.symantec.com/connect/blogs/linux-worm-targeting-hidden-devices