Powered by Blogger.

Featured 1

Curabitur et lectus vitae purus tincidunt laoreet sit amet ac ipsum. Proin tincidunt mattis nisi a scelerisque. Aliquam placerat dapibus eros non ullamcorper. Integer interdum ullamcorper venenatis. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas.

Saturday, April 12, 2014

Installing Nagios on RedHat based system

Nagios is an awesome Open Source monitoring tool, its provides you more comprehensive monitoring environment to always keep an eye on your all machines / networks whether you are in a your data center or just your small labs. With Nagios, you can monitor your remote hosts and their services remotely on a single window. It shows warnings and indicates if something goes wrong in your servers which eventually helps us to detect some problems before they occur. It helps us to...

Friday, April 11, 2014

Wake of the Heartbleed Bug

Finding a faulty car part used in nearly every make and model, but you can't recall the Internet and all the data you put out on is more simple version of the HeartBleed Bug. More improved version or more details version, a flaw in the OpenSSL open source encryption toolkit that potentially allows for the unrestricted access to server memory, is an incredibly big deal. For the past two years, much of our private online data -- including passwords, credit card information, billing addresses and user names -- stored on some of the...

Wednesday, March 19, 2014

Free and open-source software OS

When it comes to securing network infrastructure, the trend is to invest in commercial-grade appliances. Sadly, security designers tend to ignore the built-in security features available in FOSS distros. This article explains a few such features, and will help readers decide when and how to use them in a given network scenario. Before we talk about the various features built into FOSS systems, we need to understand some terminology as well as the various attack methods. A network is typically divided into LAN and WAN, wherein the LAN can have...

Monday, March 17, 2014

SElinux security contexts

This article discusses security contexts for subjects (typically, processes) and how they are assigned. To view the list of processes on your system, along with their hierarchy, use the pstree command: [root@vbg-work ~]# pstree init-+-NetworkManager-+-dhclient | `-{NetworkManager} |-abrtd |-acpid |-atd |-auditd-+-audispd-+-sedispatch | | `-{audispd} | `-{auditd} |-avahi-daemon---avahi-daemon |-bonobo-activati---{bonobo-activat} |-cimserver---3*[{cimserver}] ...

The Art of Guard - Part VII

To test the effects of the new module, let us create a sample index.html file in the DocumentRoot folder of Apache: [root@vbg ~]# echo "The Art of Guard - Part VII " > /var/www/html/index.html [root@vbg ~]# service httpd start To check if all is fine, let us view the Web page using elinks: [root@vbg ~]# elinks --dump http://localhost The Art of Guard - Part VII This shows that all is indeed fine and Apache can serve our document on the website. Let us now change the type of index.html to lfy_t and see what...