Advertenties
M

MySQL – Master/Master replication on Windows

Here you will find the step-by-step actions to succesully setup a master/master replication cluster of two MySQL 5.5 nodes on Windows. Prerequisites – Two servers with Windows installed (make sure all updates are installed) – Both machines have a clean install of MySQL 5.5 – Firewall is configured to allow port 3306 – Check the ...

N

No space left on device – running out of Inodes

One of our development servers went down this weekend. Problems started with a small PHP script that claimed that claimed “No space left on device”. Nagios however reported 32% usage of space, so that couldn’t be it? If you ever run into such trouble – most likely you have too many small or 0-sized files ...

T

Two way authentication for SSH

On each linux server that you install there will be SSH to login as root and install/edit software. Even if you secure this, by disallowing the root user to login, there is a chance somebody might figure this out and use brute-force to hack in to your system. In may situations i have added firewall ...

IPv4 versus IPv6 – Linux

All of my servers are running on both ipv4 and ipv6 for a few years now, however i had never checked to see if people were actually connecting over IPv6 to our network yet. I know i do, since i am using the Tunnelbroker from HE.net. More information on that can be found here. In ...

Monitor your developers activity

If you have a lot of developers working on source code for your company, maybe even the same source codes, and want to see what files have been accessed (and by who) i will show you some perfect commands for this. First install the software we need: [code]apt-get install acct[/code] The service will be automatically ...

S

Secure your server – Linux Malware Detect (LMD)

Malware, short for malicious software, is software designed to infiltrate or damage a computer system without the owner’s informed consent. The context which malware applies to this article is any malicious software, scripts or content that may have found its way onto a Linux system by means of a user account, such as in a ...

V

Vyatta – Blocking unwanted websites

Blocking websites with a transparant Vyatta proxy is easy to install and safe to use. You can use this in any home or business situation. Users will not notice the transparent proxy to be in place. Run the following commands to enable the webproxy (transparent) on the internal interface: [code]set service webproxy listen-address 192.168.1.1 set ...

Cookie law – Wehkamp security vulnerability

All websites are now required to obtain consent from EU visitors for the use of cookies and other tracking technologies. Probably you have seen the buttons and banners on most of the website with texts like: “We are using cookies to give you the best experience on our site. Cookies are files stored in your ...

I

Inviting hackers in your company? Are you?

I agree, this sounds like a very disturbing subject and maybe it is. But are you? Are you inviting hackers on to your network? Let my start by saying that there are 2 types of hackers and only one of them are the type you should be worry’d about. Most people have a Linkedin, Facebook, ...

E

Ethical Hacking – A Crime

In January 2013 the National Cyber ​​Security Center in Holland came with a “Guideline” of Ethical hacking and Responsible Disclosure. Meant to draft steps (rules) and keep a hacker adhere strictly to these rules, if these rules should be met the organization will not follow legal steps. However, it is not a law, so the ...

Browse Categories