<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="https://purl.org/dc/elements/1.1/" xmlns:content="https://purl.org/rss/1.0/modules/content/" xmlns:foaf="https://xmlns.com/foaf/0.1/" xmlns:og="https://ogp.me/ns#" xmlns:rdfs="https://www.w3.org/2000/01/rdf-schema#" xmlns:schema="https://schema.org/" xmlns:sioc="https://rdfs.org/sioc/ns#" xmlns:sioct="https://rdfs.org/sioc/types#" xmlns:skos="https://www.w3.org/2004/02/skos/core#" xmlns:xsd="https://www.w3.org/2001/XMLSchema#" version="2.0" xml:base="https://www.linuxjournal.com/tag/system-administration">
  <channel>
    <title>System Administration</title>
    <link>https://www.linuxjournal.com/tag/system-administration</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>Securing the Programmer</title>
  <link>https://www.linuxjournal.com/content/securing-programmer</link>
  <description>  &lt;div data-history-node-id="1339156" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-field-node-image field--type-image field--label-hidden field--item"&gt;  &lt;img src="https://www.linuxjournal.com/sites/default/files/nodeimage/story/hqdefault_1.jpg" width="480" height="360" alt="image of a lock" typeof="foaf:Image" class="img-responsive" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/susan-sons-0" lang="" about="https://www.linuxjournal.com/users/susan-sons-0" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Susan Sons&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;
I have a favorite saying: "If you are a systems administrator, you
have the keys to the kingdom. If you are an open-source programmer, you
don't know which or how many kingdoms you have the keys to." We send
our programs out into the world to be run by anyone for any purpose.
Think about that: by anyone, for any purpose. Your code might be
running in a nuclear reactor right now, or on a missile system or on a
medical device, and &lt;em&gt;no one told you&lt;/em&gt;. This is not conjecture; this is
everyday reality. Case in point: the &lt;a href="https://esr.ibiblio.org/?p=3818"&gt;US
Army installed gpsd&lt;/a&gt; on all
armor (tanks, armored personnel carriers and up-armored Humvees)
&lt;em&gt;without telling its developers&lt;/em&gt;.
&lt;/p&gt;

&lt;p&gt;
This article focuses on the needs of infrastructure software
developers—that is, developers of anything that runs as root,
has a security function, keeps the Internet as a whole working or is
life-critical. Of course, one never knows where one's software will be
run or under what circumstances, so feel free to follow this advice even
if all you maintain is a toddler login manager.
This article also covers basic security concepts and hygiene: how to think about
security needs and how to keep your development system in good shape
to reduce the risk of major computing security mishaps.
&lt;/p&gt;

&lt;p&gt;
This guide isn't going to teach you everything about security. It will
give you an idea of what to do, but in many cases, you'll need to rely
on man pages and other documentation to get the "how". I did that
both for brevity and to ensure that this article covers various Linux
distributions equally and without becoming out of date in a matter
of weeks.
&lt;/p&gt;

&lt;p&gt;
I chose the controls here carefully. It is the set of controls that
is consistently available across Linux distributions, realistic for
developers to maintain even if they are developing open-source software
as a side project and can't put many hours into it. It's maintainable without
extensive training and has highest impact for the security of the software
being developed. All of those things are judgment calls, and I welcome
debate about them. The goal of this guide is not "ultimate
security"
or the fabled "uncrackable system". It is to raise the bar for security
hygiene among open-source infrastructure software developers significantly
from where it is right now.
&lt;/p&gt;

&lt;p&gt;
I'd love to find that, in a year from now, we're all much more secure and can
iterate on our standards again. In my perfect world, I write this article
every spring, we all up our game a notch, and the following spring, we are
prepared to make the jobs of ransomware developers, spammers, oppressive
governments, corporate spies and so on even harder than before.
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/securing-programmer" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Tue, 13 Sep 2016 13:00:00 +0000</pubDate>
    <dc:creator>Susan Sons</dc:creator>
    <guid isPermaLink="false">1339156 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>March 2015 Issue of Linux Journal: System Administration</title>
  <link>https://www.linuxjournal.com/content/march-2015-issue-linux-journal-system-administration</link>
  <description>  &lt;div data-history-node-id="1338634" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-field-node-image field--type-image field--label-hidden field--item"&gt;  &lt;img src="https://www.linuxjournal.com/sites/default/files/nodeimage/story/LJ251Cover125x167.png" width="125" height="167" alt="" typeof="foaf:Image" class="img-responsive" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/shawn-powers" lang="" about="https://www.linuxjournal.com/users/shawn-powers" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Shawn Powers&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;img src="https://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/small-200px-left-align-wrap/u1002061/cover251.jpg" alt="" title="" class="imagecache-small-200px-left-align-wrap" /&gt;&lt;p&gt;
System administration is a very general term. It's our job to fix problems,
repair systems and remind people to try power cycling their troubled
desktops. We are also responsible for creating systems that don't develop
problems, need fewer repairs and run without being power cycled. In an
ideal world, system administrators would work themselves out of a job in
short order. Thankfully (or unfortunately?), that's not how it goes. We
always have problems to fix, and there's always a better way to do what
we're doing. Thus, system administration is a vibrant and ever-changing
field. This month, we learn how to be better at our jobs, even if the
measure of "success" is constantly fluctuating.
&lt;/p&gt;

&lt;p&gt;
Dave Taylor starts off this issue with a continuation of his
script-based card game. Designing games with Dave is a great way to become
better shell scripters, and so in a very real sense, we can justify playing
games at work. Kyle Rankin follows Dave with a nerdier sort of game: trying
to replace the proprietary BIOS on a ThinkPad with Libreboot. Coreboot is
an open-source BIOS replacement, and Libreboot goes a step further by
stripping out all the proprietary code. If you think having a free BIOS
with built-in GRUB sounds interesting, you'll want to check out Kyle's
column this month.
&lt;/p&gt;

&lt;p&gt;
My personal contribution to the System Administration issue is something I
find to be more useful than I ever expected. Android tablets are convenient
for things like Wi-Fi sniffing, but they are often unwieldy to carry around. My
solution is to convert a cheap pre-paid cell phone into a tiny, pocket-size
tablet. If you already have an Android phone, it might be redundant, but
for me, a $20 tablet was too hard to pass up. In my column, I give you all
the details.
&lt;/p&gt;

&lt;p&gt;
Puppet is an incredible tool for managing the system configurations of
multiple nodes. Scott Lackey describes a great tool we can use to store
site-specific data more
efficiently (and securely). Hiera is a key/value
lookup tool that integrates directly with Puppet and makes a great tool
even better. If you want to have a clear separation between your
sensitive data and the Puppet system that uses it, or if you want to save time
by reusing common data, Hiera is a tool any Puppet admin will want to check
out.
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/march-2015-issue-linux-journal-system-administration" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Mon, 02 Mar 2015 16:38:32 +0000</pubDate>
    <dc:creator>Shawn Powers</dc:creator>
    <guid isPermaLink="false">1338634 at https://www.linuxjournal.com</guid>
    </item>

  </channel>
</rss>
