aaaaaaaaaa aaaaaaaaaa aaaaaaaaaaaaa aaaaaaaaaaaaaaa aaaaaaaaaa aaaaaaaaaaaaaaaaa aaaaaaaa aaaaaaaaaa aaaaaaaaaaaa aaaaaaa aaa aaaaaaaa aaaaaaaaaaa aaaaaaa aa aaaaa aaaaaaaaaaa aaaaaaa aaaaaaa aaaaaaa

How to disable DNSMASQ in ubuntu 12.04 (Precise)

Dnsmasq is a lightweight server designed to provide DNS (and optionally DHCP and TFTP) services to a small-scale network. It can serve the names of local machines which are not in the global DNS. The DHCP server integrates with the DNS server and allows machines with DHCP-allocated addresses to appear in the DNS with names configured either in each host or in a central configuration file. Dnsmasq supports static and dynamic DHCP leases and BOOTP for network booting of diskless machines.

How To Install Percona Server 5.5 On Ubuntu 12.10

Percona Server is a drop-in replacement for MySQL. It offers more performance and scalability than the default MySQL server coming with your Linux distribution, while it uses the same init scripts and command line tools which makes it easy to use. This tutorial explains how to install Percona Server 5.5 on Ubuntu 12.10.

I do not issue any guarantee that this will work for you!

1 Preliminary Note

If MySQL is already installed on your system, this is no problem - Percona Server will ssimply replace it, but keep data and also your MySQL configuration from /etc/mysql/my.cnf.

You can find a Percona Server benchmark here (in German): Benchmark: MySQL 5.5 vs. Percona Server 5.5

Because we will run all the steps from this tutorial with root privileges, we can either prepend all commands in this tutorial with the string sudo, or we become root right now by typing
sudo su

2 Configuring apt

Percona provides an apt repository for Debian and Ubuntu, which makes Percona Server very easy to install. First, import Percona's key:

gpg --keyserver hkp://keys.gnupg.net --recv-keys 1C4CBDCDCD2EFD2A
gpg -a --export CD2EFD2A | apt-key add -

Next open /etc/apt/sources.list...

vi /etc/apt/sources.list

... and add the following two lines to it:
[...]
deb http://repo.percona.com/apt quantal main
deb-src http://repo.percona.com/apt quantal main

Next we need to pin Percona's package so that they don't get overwritten by upgrades from the Ubuntu repositories:

vi /etc/apt/preferences.d/00percona.pref

Package: *
Pin: release o=Percona Development Team
Pin-Priority: 1001
Then update the package database:
apt-get update

3 Installing Percona Server

Percona Server can now be installed as follows:
 apt-get install percona-server-server-5.5 percona-server-client-5.5
 New password for the Percona Server "root" user: <-- yourrootsqlpassword
Repeat password for the Percona Server "root" user: <-- yourrootsqlpassword
That's it already. To check your MySQL version, log into the MySQL shell:
mysql -u root -p
root@Ubuntu-1210-quantal-64-minimal ~ # mysql -u root -p
Enter password:
Welcome to the MySQL monitor. Commands end with ; or \g.
Your MySQL connection id is 38

Server version: 5.5.28-29.2 Percona Server (GPL), Release 29.2
Copyright (c) 2000, 2012, Oracle and/or its affiliates. All rights reserved.
Oracle is a registered trademark of Oracle Corporation and/or its
affiliates. Other names may be trademarks of their respective
owners.
Type 'help;' or '\h' for help. Type '\c' to clear the current input statement.

mysql> <-- quit
Bye
root@Ubuntu-1210-quantal-64-minimal ~ #


As you see, we're using Percona Server now.

4 Links

DDoS attacks are now more complex and targeted

The days when attackers relied on sheer bandwidth volume alone to knock out websites are over, with miscreants increasingly using application-layer and multi-vector attacks.
The latest annual study from DDoS attack protection company Arbor Networks reports that 46 per cent of respondents said they had experienced multi-layer attacks in the year up to the end of September 2012, markedly up from the 27 per cent recorded in the year before. The largest attack reported was 60 Gbps, the same figure as 2011.

In 2010, the peak attack hit a bumper 100 Gbps.
Instead of concentrating on upping the noise, the bad guys have switched tactics towards application-layer (targeting web services, mostly) and multi-vector attacks rather than less sophisticated packet flood attacks, Arbor said.

Data centres and cloud services are increasingly getting hit by DDoS attacks, which have traditionally been slung solely against websites. Arbor reports that "distributed denial of service (DDoS) attacks have plateaued in size but become more complex" adding that "data centre and cloud services are especially attractive targets". The vast majority (94 per cent) of data centre operators polled by Arbor Networks reported they had been hot by attacks during the study period.

DDoS attacks are used by a variety of players from hacktivists to cybercriminals using packet floods as a means of extortion to business rivals of targeted companies. Arbor reports that e-commerce and online gaming sites are among the most common targets of attack.

Arbor's study, generally regarded as one of the best of its type, is based on survey data provided by network operators from around the world that use its technology to fend off DDoS attacks.

The study also found that DNS (Domain Name Server) infrastructure remains vulnerable. More than a quarter (27 per cent) of respondents experienced customer-impacting DDoS attacks on their DNS infrastructure—a significant increase over the 12 per cent of respondents from previous year’s survey.

New Thesis SEO Blogger Template ini bisa dibilang Template SEO Friendly Terbaru 2014 karena baru selesai dikerjakan 18 Februari 2014. Ini template modifikasi "total" dari template blog SEO Thesis yang sangat digemari para blogger yang mengerti pentingnya SEO Blog itu. - See more at: http://newthesisseo.blogspot.com/2014/02/new-thesis-seo-blogger-template.html#sthash.6wNPYyGW.dpuf