Tool Tips
GSmartControl 0.8.7
Function: Detects hard drive problems
Source: http://gsmartcontrol.sourceforge.net
License: GPLv3
Alternatives: Smartctl2
Thanks to S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology), users are made aware of hard disk problems before the data medium vociferously clamors for attention. The hardware collects various information depending on the connection and the type of medium. Linux users, for example, can read this information using the smartctl
command-line tool. Those who prefer a bit more convenience should use the graphical interface GSmartControl.
The program uses smartctl
in the background and can therefore handle the same query options for disks and solid-state drives. It identifies connected data media when launched and lists them – regardless of whether they are S.M.A.R.T.-capable. You can disable displaying uncooperative media in the configuration. You can also set individual parameters for each data medium.
GSmartControl provides information about the medium if you right-click on the corresponding icon. The detailed view has several tabs that you can use to access status indicators and logfiles. The tool highlights errors and threshold values. The Perform Tests tab lets you start various self-tests that can last between a few minutes and several hours. The program also lets you integrate smartctl
output as virtual disks and therefore makes it easy to evaluate the collected data.
5 Stars GSmartControl is a practical graphical interface for smartctl
and leaves nothing to be desired.
Pam_ihosts 1.1
Function: Access control by Pam module
Source: https://github.com/ColumPaget/pam_ihosts
License: GPLv3
Alternatives: Iptables
The PAM module restricts access to Linux computers. You can decide which hosts are allowed, either via the IP or MAC address or through regional association. However, actual user authentication needs to be working before Pam_ihosts has its say.
System administrators integrate the module into the computer's PAM configuration and edit the corresponding files in the /etc/pam.d
directory. They can determine the behavior using various options. For example, there is a username or a list of accounts separated by commas in user
. An *
includes all, an !
allows a reversal, and allow-ip[s]
and allow-mac[s]
control access for specific IP or MAC addresses. IPv6 support is currently pending; Pam_ihosts only understands the IPv4 format. If the target machine has several network interfaces, administrators can specify the desired one in allow-def[s]
.
Admins also can allow or block specific regions. They can retrieve the information from the Regional Internet registries, which are linked from the Pam_ihosts documentation. These text files are in the configuration file at region-files
; allow-region[s]
lists one or more allowable ranges.
3 Stars Pam_ihosts is an interesting method for access control. As with all PAM extensions, care is need during the setup. There are deductions for the missing IPv6 support.
Rush 1.7
Function: Restrict shell access
Source: http://www.gnu.org/software/rush
License: GPLv3
Alternatives: Rbash, Rssh
Using the restricted user shell, Linux administrators can define a limited range of functions with which their users can work at the command line. The GNU tool can be used as a login shell and is also well suited for chroot operations. The guide shows examples for accesses via scp
, sftp
, rsync
, and svn
.
The /etc/rush.rc
configuration file contains the rules. System administrators can create them in a text editor of their choice. The key word rule
initiates a new definition. Instructions behind this – such as command
, uid
, and match
– define when a rule is activated. For some conditions, it is sufficient for the administrator to specify a match pattern that can also contain regular expressions. Other options such as transform
, chroot
, and chdir
define the associated actions. For example, they rewrite the original command line, start a chroot environment, or cause a directory change.
Rush executes the first matching rule by default. With such fall-through statements, the tool searches for the next matching rule after executing the previous one. The tool maintains its own WTMP and UTMP files so that administrators can keep an eye on the use of Rush. The rushwho
and rushlast
commands evaluate them and write information to standard output.
4 Stars Rush provides lots of options for limiting access to the shell. However, creating a workable configuration is pretty time consuming and involves carefully studying the documentation.
« Previous 1 2
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Direct Download
Read full article as PDF:
Price $2.95
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
News
-
Mageia 9 Beta 2 is Ready for Testing
The latest beta of the popular Mageia distribution now includes the latest kernel and plenty of updated applications.
-
KDE Plasma 6 Looks to Bring Basic HDR Support
The KWin piece of KDE Plasma now has HDR support and color management geared for the 6.0 release.
-
Bodhi Linux 7.0 Beta Ready for Testing
The latest iteration of the Bohdi Linux distribution is now available for those who want to experience what's in store and for testing purposes.
-
Changes Coming to Ubuntu PPA Usage
The way you manage Personal Package Archives will be changing with the release of Ubuntu 23.10.
-
AlmaLinux 9.2 Now Available for Download
AlmaLinux has been released and provides a free alternative to upstream Red Hat Enterprise Linux.
-
An Immutable Version of Fedora Is Under Consideration
For anyone who's a fan of using immutable versions of Linux, the Fedora team is currently considering adding a new spin called Fedora Onyx.
-
New Release of Br OS Includes ChatGPT Integration
Br OS 23.04 is now available and is geared specifically toward web content creation.
-
Command-Line Only Peropesis 2.1 Available Now
The latest iteration of Peropesis has been released with plenty of updates and introduces new software development tools.
-
TUXEDO Computers Announces InfinityBook Pro 14
With the new generation of their popular InfinityBook Pro 14, TUXEDO upgrades its ultra-mobile, powerful business laptop with some impressive specs.
-
Linux Kernel 6.3 Release Includes Interesting Features
Although it's not a Long Term Release candidate, Linux 6.3 includes features that will benefit end users.