CentOS6.7 use MySQL under vsftpd verification

CentOS6.7 use MySQL under vsftpd verification A .MySQL installation and configuration 1. Use the yum install MySQL [root@db1 ~]# yum -y install mysql mysql-server mysql-devel 2. Start MySQL service and modify the MySQL administrator password [root@db1 ~]# service mysqld start [root@db1 ~]#  /usr/bin/mysqladmin -u root password ‘test123’ 3. Create a MySQL database and verify the […]

Read more
CentOS 6.7 Squid proxy server settings

Since recently the company has been in search of software copyright, CCProxy proxy server also has been used for additional advertising in the jump. You can see from the chart WAN card is eth1, LAN card is eth0 We use yum to install the Squid: [Root @ PROXY ~] # yum -y install squid Backup […]

Read more
dtsession timeout variable setting

Examine the dtsession timeout variable setting: # cat /etc/dt/config/C/sys.resources | grep -i dtsession | grep -i lockTimeout If the dtsession timeout is greater than 15, commented or does not exist, this is a finding. Examine the Open Windows timeout settings, both global and for every user. # cat /usr/openwin/lib/app-defaults/XScreenSaver | egrep -i ‘\*(lock|timeout):’ If the […]

Read more
Specific Email Address From Your Mail Queue

You can check your current mail queue like this: postqueue -p To delete all mails from the mail queue that come from falko@example.com or are sent tofalko@example.com (the command is the same regardless of if it’s the sender or recipient address), you can use this command: mailq | tail +2 | awk ‘BEGIN { RS […]

Read more
Hardening RHEL 7.1

Secure passwords Passwords are the primary method that Red Hat Enterprise Linux 7 uses to verify a user’s identity. This is why password security is so important for protection of the user, the workstation, and the network. By default RHEL uses shadow passwords which eliminate this type of attack by storing the password hashes in […]

Read more
Shell script arrays Syntax error: “(” unexpected

Recently when I am using arrays in a script I got the error message as “Shell script arrays Syntax error: “(” unexpected”. $ sh arrays.sh  #In arrays.sh script I defined some arrays trying to extract values form it The out put I got after running the script is below Shell script arrays Syntax error: “(” […]

Read more
Securing Solaris

Protect your system from internal & external security vulnerabilities Introduction Solaris security broadly falls under two groups – one is where the system is accessible using local area network/vlan and it has to be secured against unauthorized access. Second is system is accessible over the Internet to a number of persons and it has to […]

Read more
Solaris hardening

1. Purpose of OS Hardening Computers and network elements connected to networks are vulnerable to attacks. The following is a list of commonly known types of attacks: 1. Viruses, worms, backdoors and trojans?2. Wire tapping and sniffing?3. Password cracking?4. Exploits of known vulnerabilities such as software buffer overflow 5. Denial of services (DOS) Some of […]

Read more

Hit Counter provided by dental implants orange county