≡ Menu

DROWN stands for Decrypting RSA with Obsolete and Weakened eNcryption.

This is from Vulnerability Note VU#583776: Network traffic encrypted using RSA-based SSL certificates over SSLv2 may be decrypted by the DROWN attack.

This is also referred as CVE-2016-0800.

To fix the problem, you should simply disable support for SSLv2 on servers that are using RSA-based SSL certificates. SSLv2 has been deprecated since 2011. There is no reason for you to use SSLv2 anymore.
[continue reading…]

LUKS LogoLUKS is the disk encryption for Linux.

First time when you encrypt a partition with LUKS (or when you select encrypt disk option during OS installation), you have to specify a password that will be used when you open the LUKS partition.

But, after that, you can mount and unmount the partition as many times as you like without having to enter the password until you reboot the system.
[continue reading…]

10 Most Popular Amazon AWS Storage and Database Services

Amazon AWS LogoIf you are new to Amazon AWS, and looking at their offerings, it can be bit confusing, as they have lot of services.

If you are just looking to launch a virtual server on the cloud, it is relatively straight forward, and you can use Amazon’s EC2 service.

But, when it comes to storage and database for your virtual instance on the cloud, Amazon has multiple choices.

In this tutorial, we have listed the most popular storage and database services available from Amazon.
[continue reading…]

FBI vs Apple: Should Apple Create a Backdoor for iPhone

Apple LogoUS department of justice has issued an order to Apple to help FBI unlock the iPhone used by the shooter in the San Bernardino case. But, Apple is fighting that request.

Basically FBI is requesting Apple to build a new version of the iPhone iOS (or a special tool) which will bypass several security features on iOS (including bypassing the existing screen-lock). FBI will then install this special version of iOS on the iPhone to bypass the security lock screen.
[continue reading…]

CERT has issued an vulnerability alert VU#457759 for glibc.

If you have glibc installed on your system, during the DNS resolver, it may be vulnerable to stack buffer overflow.

This article explains how to fix this glibc vulenrability on your server.
[continue reading…]

How to Shrink MySQL ibdata1 Size using innodb_file_per_table

In MySQL, when you are using InnoDB, all the tables and indexes are stored under the MySQL system tablespace.

MySQL system tablespace is ibdata1, which is located under /var/lib/mysql

The single ibdata1 file contains all the tables and indexes in your MySQL database. So, if you have a big database, this file size will grow really big.

In this tutorial, we’ll explain how to rebuild your entire MySQL database, and break the big MySQL system tablespace file into small individual MySQL table files.
[continue reading…]

How to Setup CUPS Printer Admin Web GUI for Remote Access

CUPS stands for Common UNIX Printing System

There are two ways to manage your printers on Linux environment:

  1. First, from command line, using lpadmin command, you can configure your printer and manage the print queues
  2. Second, from web UI, you can manage your printers interactively

[continue reading…]

How to Create Remote VM using docker-machine Generic SSH Driver

DockerUsing docker, you can package your enterprise application into one self-contained container, which is guaranteed to run on any environment.

This makes it easy for both developer and sysadmins to manage the application. If you are an administrator, you don’t have to hear this excuse from developer anymore: “But, it works on my dev environment!”
[continue reading…]