Latest Entries »

Of Lights & Lanterns!

Experience the bliss as I walk you through beautiful lanterns & the lights on streets of Mumbai.

1000 days of non-stop Photography!

269-365

1000 days of non-stop photography! Each day trying to find something different & unique. Each day trying to find time to photograph. Each day letting somebody know of my project & making their day showcasing them in so called “pic of the day”. Days when inspiration came in numbers and at times in trickles. Days when I felt I was going down & at times up and up.

As I complete a perfect 1000 days of photography in my 365 Project, it seems like a dream. When I began, I hardly thought I would make it beyond a year. And now, the happiness of conquering the four figure mark. It brings immense satisfaction to know that I am dedicated to photography than anything in life. That I did not cheat but each day shot for the past 1000 days.

Yet it is not entirely my efforts that made this possible. The people made this journey possible. My friends who contributed in my daily vision, the strangers who became friends, the friends of friends, the nature, the flora and the fauna, the street characters, the toddlers, the inanimate & much more. To the people who appreciated and showered praise even when I knew deep within that this is not my best work. It only made me to work harder towards raising the bar each time, each day. Thank you! :)

A remotely exploitable vulnerability in bash has been discovered by Stephane Chazelas. The vulnerability has the CVE identifier CVE-2014-6271 and has been given the name Shellshock by some. This affects Debian as well as other Linux distributions. The vulnerability arises from the fact that you can create environment variables with specially-crafted values before calling the Bash shell. These variables can contain code, which gets executed as soon as the shell is invoked. The name of these crafted variables does not matter, only their contents. As a result, this vulnerability is exposed in many contexts.

This issue affects all software that uses the Bash shell and parses values of environment variables. This issue is especially dangerous as there are many possible ways Bash can be called by an application. Quite often if an application executes another binary, Bash is invoked to accomplish this. Because of the pervasive use of the Bash shell, this issue is quite serious and should be treated as such.

However, there is nothing to worry about as a patch has been issued. It is recommended to install it using your system software manager.

Bash Patch

You can verify the upgrade by running the following command. You should receive “Not vulnerable”.

$env check=’Not vulnerable’ x='() { :;}; check=Vulnerable’ bash -c ‘echo $check

Read more : https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/

varnish

If you have a website, it is crucial it loads up fast so users get a good experience. There is a small piece of software known ‘Varnish Cache’ which can help your side load faster by caching its content. Varnish Cache is an open source web application accelerator also known as HTTP accelerator or caching HTTP reverse proxy. Varnish Cache can dramatically improve the site performance and depending upon your system architecture can speedup your website performance by 80% or more.
View full article »

Configure Static IP in RHEL 7

It is fairly simple to configure a static IP address in Red Hat Enterprise Linux 7.

First one needs to stop & disable the Network Manager service. We do so since we are going to manually enter our network parameters.

To stop & disable the Network Manager service issue;

#systemctl stop NetworkManager.service

#systemctl disable NetworkManager.service

Next issue the following command if you are not sure of the name of the interface you want to set the static IP for. [If you have a single network interface card(NIC) installed in your system, there would be only a single file with the NIC name in network-scripts directory & hence issuing this command is avoidable.]

#ipconfig -a

Next we need to edit manually the interface file. It is recommended you take a backup of this file first before editing.

#vi /etc/sysconfig/network-scripts/ifcfg-p2p1

Keep the default file parameters as they are & simply make the below changes.

BOOTPROTO=STATIC

ONBOOT=yes

IPADDR=192.168.1.71

NETMASK=255.255.255.0

GATEWAY=192.168.0.1

Save the file & quit Vi.

You should keep a note in your mind. Whenever you edit a network interface file, you must restart the network service for the changes to take effect. Since RHEL 7 uses ‘systemd’ to manage the services we issue the following command to restart the network service.

#systemctl restart network

(Though one can even use the old #service network restart)

Once the network service is restarted successfully, you can verify the new IP by;

$ifconfig

Follow

Get every new post delivered to your Inbox.

Join 81 other followers

%d bloggers like this: