Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Create free account
AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
Debian for WDTV Live (running WDLXTV) - Inc. Build Essentials
Back in 2010, b-rad released Debian Squeeze (MIPSEL) for a WDLXTV hacked WDTV:
http://forum.wdlxtv.com/viewtopic.php?f=43&t=494&start=0
I've placed a copy on SourceForge with the script to chroot the image on a hacked WDTV Live (WDLXTV).
Since then, Squeeze is no longer supported, so Debian moved the source repo's.
The original "/etc/apt/sources.list" file needs to be changed:
deb http://archive.debian.org/debian-archive/debian/ squeeze main contrib non-free
deb-src...
The Black Hole MTA is for use in automated package build systems. It looks like a Mail Transfer Agent (MTA) and email goes in but nothing comes out. It is intended for use in chroot jails for automated package build systems.
creates an extra socket for syslog (e.g. in a chroot jail)
Developed for systems that have an older version of syslogd which does not support multiple sockets (e.g. via the '-a' flag). Performs extensive message validation according to RFC 3164
This is an add-on to stow. If the "make install" didn't work with DESTDIR argument(or use another installer), stow-jail would close the installer command to the sandbox(unionfs+chroot),in this way all go to the "/stow/package_name" directory.
Feathery is a very small and full-featured ftp server for embedded devices. It is easy portable to every 8, 16 or 32 bit architecture and can run with or without an operating system.
A secure anonymous FTP server that runs unprivileged for most of the time. This server utilizes a chroot environment and contains its own directory change code, and directory listing code so that it can run efficiently as a threaded server.
Small SMTP wrapper designed to be used in chroot-ed environment as a sendmail command-line tool replacement. e.g. warpper can be used by php ( by function mail ) instead of using SMTP client written in php
Apache security module. Makes Apache configurable to work as diffrent user, group and diffrent chroot() environment for each VirtualServer and for ~user request. Designed mostly for ISP to make Apache secure.
chroot_safe, a tool to chroot any application in a sane manner without requring binaries,
shared libraries etc within the chroot or any support from the application. Works with any
dynamically linked application.
Eselstall Secure Environment to Launch Software you don't Trust At aLL:
Combined chroot/setuid tool to easily launch background processes (servers) in a confined environment. Eliminates the need for su in the changeroot directory.
The sandbox system call API is a simple yet powerful mechanism for
confining untrusted code. It is similar to chroot() and BSD jails, but has
much greater flexibility and expressive power. The code is mostly complete
but not yet fully functional.
Jail Chroot Project is an attempt of write a tool that builds a chrooted environment. The main goal of Jail is to be as simple as possible, and highly portable. The most difficult step when building a chrooted environment is to set up the right libraries
chruid is a small but flexible replacement for a chroot + su kombo. i wrote it because i was in the need to chroot processes and having them run under a non-privileged uid/gid without having to install su (which would include pam, nss, ... overhead on som
This project's single goal is to maintain a patch that allows chrooting of users in OpenSSH.
This patch will cause sshd to chroot when it encounters the magic token '/./' in a users home directory. The directory portion before the token is the direc
RASH is a chroot jail wrapper for ordinary Unix shells.
a "shell" that the administrator could assign to a user that would jail that user using Unix's chroot() and then execute a real shell within the jail environment.