July 2020
« Mar    


WordPress Quotes

Think twice before you speak, because your words and influence will plant the seed of either success or failure in the mind of another.
Napoleon Hill
July 2020
« Mar    

Short Cuts

2012 SERVER (64)
2016 windows (9)
AIX (13)
Amazon (40)
Ansibile (19)
Apache (135)
Asterisk (2)
cassandra (2)
Centos (211)
Centos RHEL 7 (270)
centos8 (3)
chef (3)
cloud (2)
cluster (3)
Coherence (1)
DB2 (5)
DISK (25)
DNS (9)
Docker (30)
Eassy (11)
ELKS (1)
Fedora (6)
ftp (5)
GIT (3)
GOD (2)
Grub (1)
Hacking (10)
Hadoop (6)
health (2)
horoscope (23)
Hyper-V (10)
IIS (15)
JAVA (7)
JBOSS (32)
jenkins (1)
Kubernetes (7)
Ldap (5)
Linux (188)
Linux Commands (166)
Load balancer (5)
mariadb (14)
Mongodb (4)
MQ Server (24)
MYSQL (84)
Nagios (5)
NaturalOil (13)
Nginx (35)
Ngix (1)
openldap (1)
Openstack (6)
Oracle (35)
Perl (3)
Postfix (19)
Postgresql (1)
PowerShell (2)
Python (3)
qmail (36)
Redis (12)
RHCE (28)
Security on Centos (29)
SFTP (1)
Shell (64)
Solaris (58)
Sql Server 2012 (4)
squid (3)
SSH (10)
SSL (14)
Storage (1)
swap (3)
TIPS on Linux (28)
tomcat (62)
Ubuntu (1)
Uncategorized (30)
Veritas (2)
vfabric (1)
VMware (28)
Weblogic (38)
Websphere (71)
Windows (19)
Windows Software (2)
wordpress (1)

WP Cumulus Flash tag cloud by Roy Tanck requires Flash Player 9 or better.

Who's Online

0 visitors online now
0 guests, 0 bots, 0 members

Hit Counter provided by dental implants orange county

DDoS Protection With IPtables

DDoS Protection With IPtables

There are different ways of building your own anti-DDoS rules for iptables. We will be discussing the most effective iptables DDoS protection methods in this comprehensive tutorial. This guide will teach you how to: Select the best iptables table and chain to stop DDoS attacks Tweak your kernel settings to mitigate […]

TCP dump and NMAP

1, to detect whether the specified network segment FTP service host, do not do DNS reverse analysis

nmap -sS –n –p 21 2, to detect whether the specified server has a specific port services

nmap –n –p T:21-25,80,110,3389–sS

3, the use of TCP connection scan to detect the specified server, even if it […]

keytool commands

Public and private keys from a Java Key Store Step 1: Creating the “public-private” key-pair. keytool -genkey -alias client -validity 365 -keystore keystore.jks

Step 2: Validate the “public-private” key pair. keytool -list -v -keystore keystore.jks

Step 3: Extract the “public key” from the “public-private” keytool -export -alias client -keystore keystore.jks -rfc -file public.cert

Step […]

OpenSSL Commands

OpenSSL Commands

After you applied for a personal or a host certificate, you may need to export the bundle from your browser and convert them into a different format to be able to use them in tools like GSI-SSH in order to authenticate yourself to the grid, and also to be able to install your […]

Boot Partition Full ( CentOS 7 )

Boot Partition Full ( CentOS 7 )

root@RHEL7HARDEN:~# df -h

Filesystem Size Used Avail Use% Mounted on /dev/mapper/vg0-root 96G 15G 77G 16% / devtmpfs 3.8G 0 3.8G 0% /dev tmpfs 3.8G 152K 3.8G 1% /dev/shm tmpfs 3.8G 9.1M 3.8G 1% /run tmpfs 3.8G 0 3.8G 0% /sys/fs/cgroup /dev/sda1 283M 270M 0 100% /boot /dev/mapper/vg0-home 577G […]

Verify Package Integrity Using RPM

Verify Package Integrity Using RPM

The RPM package management system includes the ability to verify the integrity of installed packages by comparing the installed files with information about the files taken from the package metadata stored in the RPM database.

Although an attacker could corrupt the RPM database (analogous to attacking the AIDE database […]

Remount the /dev/shm Partition in Fedora/CentOS

Remount the /dev/shm Partition in Fedora/CentOS This is to assist with a CSF warning you may receive about /dev/shm being incorrectly mounted, simply run the following:

nano /etc/fstab

Replace this line:

tmpfs /dev/shm tmpfs defaults 0 0

With this one:

tmpfs /dev/shm tmpfs defaults,noexec,nosuid 0 0

Save & Exit nano, then remount using the following […]

Bloging on Open Source,Linux,BSD and Internet World What is /dev/shm and how to mount /dev/shm

What is /dev/shm and how to mount /dev/shm

Introduction: /dev/shm is nothing but implementation of traditional shared memory concept. It is an efficient means of passing data between programs. One program will create a memory portion, which other processes (if permitted) can access. This will result into speeding up things on Linux. shm / shmfs […]

mount s3 bucket in linux EC2 instance

if you have not created a s3 bucket kindly go through with EC2 documentation.The documentation is very clear and easy to understand .This is the link how to create S3bucket

After creating a new bucket follow the given below steps.

Step 1: Download the latest s3fs package from S3fs link


Step 2: Untar the […]

Increasing Linux server security with nodev, nosuid and no exec options

Expertise level: Advanced Hackers can use temporary storage directories such as /tmp to store and execute unwanted programs and hack into a server. Other temporary storage directories that can be used for malicious activities are /var/tmp and /dev/shm. Follow these steps to secure your Linux server against this vulnerability: Add nodev, nosuid, and noexec options […]