Tool tests on the fast track
File System Overview
With eagle eyes, TrackFS watches over filesystems and logs the changes made to them. The tool notices when new files and directories are added, as well as when users or programs update or remove files.
Contrary to the well-known Installwatch tool, TrackFS does not rely on the
LD_PRELOAD function. Instead, the program uses the
ptrace system call, executing all child processes of the monitored program with tracing enabled, and thus monitors system calls.
ptrace, TrackFS can cope with statically linked libraries – but at the expense of execution speed. The tool is not suitable for daily filesystem monitoring; its strengths lie in monitoring installation processes or looking for system errors. By default, TrackFS logs the changes it identifies in the logfile specified by
-l. To keep the log readable, the tool combines multiple changes to an object in a single entry.
The tool also offers to create backup copies of manipulated files and folders (call option
-b). The parameter
-I expects a list of patterns to exclude objects from monitoring. TrackFS ignores these objects, does not save them, and does not write them to the log.
TrackFS is well suited for monitoring the filesystem during an installation or cleanup. The tool is useful for finding bugs, as well.
Synchronizing the Time via HTTP
Alternatives: Ntpdate, Rdate
The correct system time is a must-have. If users can't synchronize the date and time with an external or internal time server using
time (e.g., because the firewall blocks the appropriate port), they can use
htpdate. The tool sends requests to an arbitrary web server via the HTTP port and synchronizes the settings of the local computer with the remote source.
To do this, HTPDate interprets the timestamp in the HTTP header. By default, the tool uses HTTP version 1.1; alternatively, you can specify the parameter
-0 to force it to use HTTP 1.0. HTPDate can handle both IPv4 and IPv6. Optionally, the tool runs as a daemon and queries the web server at regular intervals. It can define the optimum interval between the requests itself, or alternatively, the user can do this manually using
-M for custom limits.
-b option launches
htpdate in burst mode, which asks for the time several times on each run, thus providing more accurate results. To query one or more web servers for the time, simply call the program along with the server addresses. You can specify up to 16 web servers, but usually three will suffice. The
-q option ensures that HTPDate only displays the time vector but does not change the system time.
HTPDate steps into the breach and offers time synchronization when NTP is not available. The tool runs in the background as a daemon, if so desired.
Burning and Cataloging CDs and DVDs
Alternatives: PHP CD Archive, phpMyCatalog
The MKAT tool suite helps users create and catalog audio and data CDs and DVDs. The collection contains four command-line tools:
mkata. The first two create the images or burn disks, whereas the last two take care of cataloging. All of the programs are shell scripts that rely on proven tools such as
growisofs in the background.
The setup for the individual MKAT components is found in the
/etc/mkatrc file. Also, you can use this file as a template for a personal configuration file in
~/.mkatrc. The files essentially contain parameters for generating the images and starting the burn software, as well as paths to the catalog directories. By default, these are below
~/.mkat. The settings in
~/.mkatrc take precedence over those in
For each disk, you will see a file with a label and the
.list file extension. All of the files for the disk reside here, including their sizes and corresponding MD5 checksums. Tags are also included, as specified by the user when cataloging the disk. Later, you can search by filename as well as by these tags.
With just a few simple steps, the MKAT tool suite not only creates data CDs and DVDs but also records them in a catalog. The shell scripts rely on familiar tools and do not require a database connection.
Buy this article as PDF
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.