Dnsmasq is a lightweight server designed to provide DNS (and optionally DHCP and TFTP) services to a small-scale network. It can serve the names of local machines which are not in the global DNS. The DHCP server integrates with the DNS server and allows machines with DHCP-allocated addresses to appear in the DNS with names configured either in each host or in a central configuration file. Dnsmasq supports static and dynamic DHCP leases and BOOTP for network booting of diskless machines.
How to disable DNSMASQ in ubuntu 12.04 (Precise)
How To Install Percona Server 5.5 On Ubuntu 12.10
Percona Server
is a drop-in replacement for MySQL. It offers more performance and
scalability than the default MySQL server coming with your Linux
distribution, while it uses the same init scripts and command line tools
which makes it easy to use. This tutorial explains how to install
Percona Server 5.5 on Ubuntu 12.10.
I do not issue any guarantee that this will work for you!
1 Preliminary Note
If MySQL is already installed on your system, this is no problem - Percona Server will ssimply replace it, but keep data and also your MySQL configuration from /etc/mysql/my.cnf.You can find a Percona Server benchmark here (in German): Benchmark: MySQL 5.5 vs. Percona Server 5.5
Because we will run all the steps from this tutorial with root privileges, we can either prepend all commands in this tutorial with the string sudo, or we become root right now by typing
2 Configuring apt
Percona provides an apt repository for Debian and Ubuntu, which makes Percona Server very easy to install. First, import Percona's key:Next open /etc/apt/sources.list...
[...] deb http://repo.percona.com/apt quantal main deb-src http://repo.percona.com/apt quantal main |
Next we need to pin Percona's package so that they don't get overwritten by upgrades from the Ubuntu repositories:
Package: * Pin: release o=Percona Development Team Pin-Priority: 1001 |
3 Installing Percona Server
Percona Server can now be installed as follows:New password for the Percona Server "root" user: <-- yourrootsqlpasswordapt-get install percona-server-server-5.5 percona-server-client-5.5
Repeat password for the Percona Server "root" user: <-- yourrootsqlpassword
That's it already. To check your MySQL version, log into the MySQL shell:
Enter password:
Welcome to the MySQL monitor. Commands end with ; or \g.
Your MySQL connection id is 38
Server version: 5.5.28-29.2 Percona Server (GPL), Release 29.2
affiliates. Other names may be trademarks of their respective
owners.
Bye
root@Ubuntu-1210-quantal-64-minimal ~ #
As you see, we're using Percona Server now.
4 Links
- Percona Server: http://www.percona.com/software/percona-server
- MySQL: http://www.mysql.com/
- Ubuntu: http://www.ubuntu.com/
DDoS attacks are now more complex and targeted
The days when attackers relied on sheer bandwidth volume alone to
knock out websites are over, with miscreants increasingly using
application-layer and multi-vector attacks.
The latest annual study from DDoS attack protection company Arbor
Networks reports that 46 per cent of respondents said they had
experienced multi-layer attacks in the year up to the end of September
2012, markedly up from the 27 per cent recorded in the year before. The
largest attack reported was 60 Gbps, the same figure as 2011.
Data centres and cloud services are increasingly getting hit by DDoS attacks, which have traditionally been slung solely against websites. Arbor reports that "distributed denial of service (DDoS) attacks have plateaued in size but become more complex" adding that "data centre and cloud services are especially attractive targets". The vast majority (94 per cent) of data centre operators polled by Arbor Networks reported they had been hot by attacks during the study period.
DDoS attacks are used by a variety of players from hacktivists to cybercriminals using packet floods as a means of extortion to business rivals of targeted companies. Arbor reports that e-commerce and online gaming sites are among the most common targets of attack.
Arbor's study, generally regarded as one of the best of its type, is based on survey data provided by network operators from around the world that use its technology to fend off DDoS attacks.
The study also found that DNS (Domain Name Server) infrastructure remains vulnerable. More than a quarter (27 per cent) of respondents experienced customer-impacting DDoS attacks on their DNS infrastructure—a significant increase over the 12 per cent of respondents from previous year’s survey.