Tool Tips

GSmartControl 0.8.7

Function: Detects hard drive problems

Source: http://gsmartcontrol.sourceforge.net

License: GPLv3

Alternatives: Smartctl2

Thanks to S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology), users are made aware of hard disk problems before the data medium vociferously clamors for attention. The hardware collects various information depending on the connection and the type of medium. Linux users, for example, can read this information using the smartctl command-line tool. Those who prefer a bit more convenience should use the graphical interface GSmartControl.

The program uses smartctl in the background and can therefore handle the same query options for disks and solid-state drives. It identifies connected data media when launched and lists them  – regardless of whether they are S.M.A.R.T.-capable. You can disable displaying uncooperative media in the configuration. You can also set individual parameters for each data medium.

GSmartControl provides information about the medium if you right-click on the corresponding icon. The detailed view has several tabs that you can use to access status indicators and logfiles. The tool highlights errors and threshold values. The Perform Tests tab lets you start various self-tests that can last between a few minutes and several hours. The program also lets you integrate smartctl output as virtual disks and therefore makes it easy to evaluate the collected data.

5 Stars   GSmartControl is a practical graphical interface for smartctl and leaves nothing to be desired.

Pam_ihosts 1.1

Function: Access control by Pam module

Source: https://github.com/ColumPaget/pam_ihosts

License: GPLv3

Alternatives: Iptables

The PAM module restricts access to Linux computers. You can decide which hosts are allowed, either via the IP or MAC address or through regional association. However, actual user authentication needs to be working before Pam_ihosts has its say.

System administrators integrate the module into the computer's PAM configuration and edit the corresponding files in the /etc/pam.d directory. They can determine the behavior using various options. For example, there is a username or a list of accounts separated by commas in user. An * includes all, an ! allows a reversal, and allow-ip[s] and allow-mac[s] control access for specific IP or MAC addresses. IPv6 support is currently pending; Pam_ihosts only understands the IPv4 format. If the target machine has several network interfaces, administrators can specify the desired one in allow-def[s].

Admins also can allow or block specific regions. They can retrieve the information from the Regional Internet registries, which are linked from the Pam_ihosts documentation. These text files are in the configuration file at region-files; allow-region[s] lists one or more allowable ranges.

3 Stars   Pam_ihosts is an interesting method for access control. As with all PAM extensions, care is need during the setup. There are deductions for the missing IPv6 support.

Rush 1.7

Function: Restrict shell access

Source: http://www.gnu.org/software/rush

License: GPLv3

Alternatives: Rbash, Rssh

Using the restricted user shell, Linux administrators can define a limited range of functions with which their users can work at the command line. The GNU tool can be used as a login shell and is also well suited for chroot operations. The guide shows examples for accesses via scp, sftp, rsync, and svn.

The /etc/rush.rc configuration file contains the rules. System administrators can create them in a text editor of their choice. The key word rule initiates a new definition. Instructions behind this – such as command, uid, and match – define when a rule is activated. For some conditions, it is sufficient for the administrator to specify a match pattern that can also contain regular expressions. Other options such as transform, chroot, and chdir define the associated actions. For example, they rewrite the original command line, start a chroot environment, or cause a directory change.

Rush executes the first matching rule by default. With such fall-through statements, the tool searches for the next matching rule after executing the previous one. The tool maintains its own WTMP and UTMP files so that administrators can keep an eye on the use of Rush. The rushwho and rushlast commands evaluate them and write information to standard output.

4 Stars   Rush provides lots of options for limiting access to the shell. However, creating a workable configuration is pretty time consuming and involves carefully studying the documentation.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

comments powered by Disqus

Direct Download

Read full article as PDF:

Price $2.95

News