Home | About Storix | Storix Blog

About Us

Sysadmins creating software for Sysadmins.
Storix Blog

Storix® System Backup Administrator announces support for Linux distributions optimized for IBM POWER8

San Diego – September 23, 2015– Storix, Inc., providers of disaster recovery solutions for Linux and Unix systems, today announced the general availability of System Backup Administrator (SBAdmin) version 8.2.4.0, which includes support for little endian configurations of Linux distributions optimized for IBM Power 8 processors.

Storix SBAdmin was one of the first enterprise applications to provide support for Linux on IBM Power systems back in 2003. Since that time, Storix has been committed to ensure that workloads running on Linux on Power are protected.

In addition to Linux big endian distributions, SBAdmin provides protection for the following Linux little endian distributions: Red Hat Enterprise Linux 7.1 (RHEL7.1), Ubuntu 14.04 or later, and SUSE Linux Enterprise Server 12 (SLES 12). These Linux distributions only run on POWER8 technology-based servers.

 

Storix® System Backup Administrator Announces Support for SUSE Linux Enterprise 12

San Diego – February 26, 2015 – Storix, Inc., providers of disaster recovery solutions for Linux and Unix systems, today announced the general availability of System Backup Administrator (SBAdmin) version 8.2.2.0, which includes support for the latest release of SUSE Linux Enterprise Server (SLES) 12.

"From an operating system perspective, SUSE has been working very hard to advance their solutions beyond other Linux vendors.", stated Rich Turner, SBAdmin Product Manager.

Read more...
 

Linux "Ghost" Vulnerability

In case you are not already aware, there has been a Linux vulnerability discovered commonly known as "GHOST" which is a 'buffer overflow' bug affecting the gethostbyname() and gethostbyname2() function calls in the glibc library. Remote attackers can use this flaw to execute arbitrary code with the permissions of the user running the application. It could also perform an out-of-bounds array access, causing the process to crash and in some scenarios, this could allow a remote attacker to cause a persistent denial of servers.

Click here for more information about CVE-2015-0235

Get a backup before you patch!
For our current customers, you already know the benefits of having a full-system backup on hand in case of emergencies. If you are not already a customer, we recommend using our 30-day free trial to get your tier 1 systems backed up before you patch.

 

Linus Names Next Linux Release

Here is a comical article from The Register discussing Linus Tovalds decision to name the next major release of the Linux kernel. Linus deceided to ask the community for input regarding the naming. We are not sure if this is an example of disfunctional democracy or improper polling techniques.

You can see the Register Article here or the kernel mailing list post here.

 

Sony Pictures' 'wipeout'
PDF 
Friday, December 12 2014 00:00

alt

Last week Sony Pictures announced that they had been hit by a particularly nasty hacker attack¹, which among other things, stole payroll information, wiped computers clean, and taunted staff with a picture of a skull and a scrolling banner attributing responsibility. This comes in the wake of an attack on Sony's Computer Entertainment subdivision in 2011 that left their entire online gaming infrastructure unreachable for 6 weeks and cost the company hundreds of millions of dollars.

So why should you care? Because attacks like this are becoming more common, and if you're in the IT hotseat when it happens you will probably be out of a job, even if it's just to placate angry shareholders or customers. In a recent interview with Public Radio's Marketplace news program, Wired reporter Kim Zetter said:

Everyone is going to get hacked. The question is: What is your game plan for dealing with a hack once you discover it? ² 

Read more...
 
<< Start < Prev 1 2 Next > End >>

Page 1 of 2