September 2015
M T W T F S S
« Aug   Oct »
 123456
78910111213
14151617181920
21222324252627
282930  

Categories

WordPress Quotes

There is no passion to be found playing small - in settling for a life that is less than the one you are capable of living.
Nelson Mandela

Recent Comments

September 2015
M T W T F S S
« Aug   Oct »
 123456
78910111213
14151617181920
21222324252627
282930  

Short Cuts

2012 SERVER (64)
2016 windows (9)
AIX (13)
Amazon (10)
Ansibile (17)
Apache (122)
Asterisk (2)
cassandra (2)
Centos (207)
Centos RHEL 7 (242)
chef (3)
cloud (2)
cluster (3)
Coherence (1)
DB2 (5)
DISK (25)
DNS (9)
Docker (21)
Eassy (11)
EXCHANGE (3)
Fedora (6)
ftp (4)
GOD (2)
Grub (1)
Hacking (10)
Hadoop (6)
Hyper-V (10)
IIS (15)
IPTABLES (15)
JAVA (6)
JBOSS (31)
jenkins (1)
Kubernetes (1)
Ldap (4)
Linux (186)
Linux Commands (167)
Load balancer (5)
mariadb (13)
Mongodb (3)
MQ Server (21)
MYSQL (73)
Nagios (4)
NaturalOil (13)
Nginx (23)
Ngix (1)
Openstack (6)
Oracle (29)
Perl (3)
Postfix (19)
PowerShell (2)
Python (3)
qmail (36)
Redis (9)
RHCE (28)
SCALEIO (1)
Security on Centos (29)
SFTP (1)
Shell (64)
Solaris (58)
Sql Server 2012 (4)
squid (3)
SSH (10)
SSL (14)
Storage (1)
swap (3)
TIPS on Linux (28)
tomcat (58)
Uncategorized (29)
Veritas (2)
vfabric (1)
VMware (28)
Weblogic (38)
Websphere (71)
Windows (19)
Windows Software (2)
wordpress (1)
ZIMBRA (17)

WP Cumulus Flash tag cloud by Roy Tanck requires Flash Player 9 or better.

Who's Online

13 visitors online now
1 guests, 12 bots, 0 members

Hit Counter provided by dental implants orange county

CentOS6.7 use MySQL under vsftpd verification

CentOS6.7 use MySQL under vsftpd verification A .MySQL installation and configuration 1. Use the yum install MySQL [root@db1 ~]# yum -y install mysql mysql-server mysql-devel 2. Start MySQL service and modify the MySQL administrator password [root@db1 ~]# service mysqld start [root@db1 ~]#  /usr/bin/mysqladmin -u root password ‘test123’ 3. Create a MySQL database and verify […]

CentOS 6.7 Squid proxy server settings

Since recently the company has been in search of software copyright, CCProxy proxy server also has been used for additional advertising in the jump.

You can see from the chart

WAN card is eth1, LAN card is eth0

We use yum to install the Squid:

[Root @ PROXY ~] # yum -y install squid

Backup […]

RHEL and Centos 7 – COMPLETE GUIDE

a) pstree b) systemctl list-unit-files –type=target c)

[root@clusterserver1 ~]# ls /etc/rc.d/ init.d rc0.d rc1.d rc2.d rc3.d rc4.d rc5.d rc6.d rc.local [root@clusterserver1 ~]# ls

dtsession timeout variable setting

Examine the dtsession timeout variable setting:

# cat /etc/dt/config/C/sys.resources | grep -i dtsession | grep -i lockTimeout If the dtsession timeout is greater than 15, commented or does not exist, this is a finding.

Examine the Open Windows timeout settings, both global and for every user.

# cat /usr/openwin/lib/app-defaults/XScreenSaver | egrep -i ‘\*(lock|timeout):’ If […]

Specific Email Address From Your Mail Queue

You can check your current mail queue like this:

postqueue -p

To delete all mails from the mail queue that come from falko@example.com or are sent tofalko@example.com (the command is the same regardless of if it’s the sender or recipient address), you can use this command:

mailq | tail +2 | awk ‘BEGIN […]

Hardening RHEL 7.1

Secure passwords

Passwords are the primary method that Red Hat Enterprise Linux 7 uses to verify a user’s identity. This is why password security is so important for protection of the user, the workstation, and the network.

By default RHEL uses shadow passwords which eliminate this type of attack by storing the password hashes in […]

solaris hardening reference

Download (PDF, 80KB)

Shell script arrays Syntax error: “(” unexpected

Recently when I am using arrays in a script I got the error message as “Shell script arrays Syntax error: “(” unexpected”.

$ sh arrays.sh  #In arrays.sh script I defined some arrays trying to extract values form it

The out put I got after running the script is below

Shell script arrays Syntax error: “(” […]

Securing Solaris

Protect your system from internal & external security vulnerabilities

Introduction Solaris security broadly falls under two groups – one is where the system is accessible using local area network/vlan and it has to be secured against unauthorized access. Second is system is accessible over the Internet to a number of persons and it has to […]

Solaris hardening

1. Purpose of OS Hardening

Computers and network elements connected to networks are vulnerable to attacks. The following is a list of commonly known types of attacks:

1. Viruses, worms, backdoors and trojans?2. Wire tapping and sniffing?3. Password cracking?4. Exploits of known vulnerabilities such as software buffer overflow 5. Denial of services (DOS)

Some of […]