No Image

Using NGINX and NGINX Plus to Load Balance Apache Tomcat Servers

2016-01-12 KENNETH 0

NGINX and NGINX Plus are commonly used to enhance performance and fault tolerance by acting as a load balancer for many application servers, including Apache TomcatTM. To help customers get the most out of their Tomcat deployments, NGINX, Inc. has published a new deployment guide, Using NGINX and NGINX Plus to Load Balance Apache Tomcat Servers. This guide details how NGINX and NGINX Plus can be utilized as a load balancer and application delivery controller for Apache Tomcat application servers. Why NGINX and NGINX Plus? Many Apache Tomcat deployments use the Apache HTTP Server for application delivery, as specified in the Tomcat installation instructions. Apache HTTP Server’s thread-per-connection architecture delivers acceptable performance under low to medium load, but under heavy load the limitations of the architecture begin to surface. In one common scenario, the thread pool becomes exhausted when there is a large [ more… ]

No Image

USN-2860-1: Oxide vulnerabilities

2016-01-12 KENNETH 0

Ubuntu Security Notice USN-2860-1 11th January, 2016 oxide-qt vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 15.10 Ubuntu 15.04 Ubuntu 14.04 LTS Summary Several security issues were fixed in Oxide. Software description oxide-qt – Web browser engine library for Qt (QML plugin) Details A race condition was discovered in the MutationObserver implementation inBlink. If a user were tricked in to opening a specially crafted website,an attacker could potentially exploit this to cause a denial of servicevia renderer crash, or execute arbitrary code with the privileges of thesandboxed render process. (CVE-2015-6789) An issue was discovered with the page serializer in Blink. If a user weretricked in to opening a specially crafted website, an attacker couldpotentially exploit this to inject arbitrary script or HTML.(CVE-2015-6790) Multiple security issues were discovered in Chromium. If a user weretricked in to [ more… ]