Latest Entries »

A remotely exploitable vulnerability in bash has been discovered by Stephane Chazelas. The vulnerability has the CVE identifier CVE-2014-6271 and has been given the name Shellshock by some. This affects Debian as well as other Linux distributions. The vulnerability arises from the fact that you can create environment variables with specially-crafted values before calling the Bash shell. These variables can contain code, which gets executed as soon as the shell is invoked. The name of these crafted variables does not matter, only their contents. As a result, this vulnerability is exposed in many contexts.

This issue affects all software that uses the Bash shell and parses values of environment variables. This issue is especially dangerous as there are many possible ways Bash can be called by an application. Quite often if an application executes another binary, Bash is invoked to accomplish this. Because of the pervasive use of the Bash shell, this issue is quite serious and should be treated as such.

However, there is nothing to worry about as a patch has been issued. It is recommended to install it using your system software manager.

Bash Patch

You can verify the upgrade by running the following command. You should receive “Not vulnerable”.

$env check=’Not vulnerable’ x='() { :;}; check=Vulnerable’ bash -c ‘echo $check

Read more : https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/

varnish

If you have a website, it is crucial it loads up fast so users get a good experience. There is a small piece of software known ‘Varnish Cache’ which can help your side load faster by caching its content. Varnish Cache is an open source web application accelerator also known as HTTP accelerator or caching HTTP reverse proxy. Varnish Cache can dramatically improve the site performance and depending upon your system architecture can speedup your website performance by 80% or more.
View full article »

Configure Static IP in RHEL 7

It is fairly simple to configure a static IP address in Red Hat Enterprise Linux 7.

First one needs to stop & disable the Network Manager service. We do so since we are going to manually enter our network parameters.

To stop & disable the Network Manager service issue;

#systemctl stop NetworkManager.service

#systemctl disable NetworkManager.service

Next issue the following command if you are not sure of the name of the interface you want to set the static IP for. [If you have a single network interface card(NIC) installed in your system, there would be only a single file with the NIC name in network-scripts directory & hence issuing this command is avoidable.]

#ipconfig -a

Next we need to edit manually the interface file. It is recommended you take a backup of this file first before editing.

#vi /etc/sysconfig/network-scripts/ifcfg-p2p1

Keep the default file parameters as they are & simply make the below changes.

BOOTPROTO=STATIC

ONBOOT=yes

IPADDR=192.168.1.71

NETMASK=255.255.255.0

GATEWAY=192.168.0.1

Save the file & quit Vi.

You should keep a note in your mind. Whenever you edit a network interface file, you must restart the network service for the changes to take effect. Since RHEL 7 uses ‘systemd’ to manage the services we issue the following command to restart the network service.

#systemctl restart network

(Though one can even use the old #service network restart)

Once the network service is restarted successfully, you can verify the new IP by;

$ifconfig

Spark of Inspiration

It is rightly said – “For one’s Imagination, sky is the limit!”

A strike of imagination and our day is transformed into a worthy one. Once the human mind is stretched, it never regains its original boundaries. It is a beautiful monster. If feeded with regular supply of inspiration, it can transform a life. If not, it can ruin one.

53026 View full article »

It is crucial that you use genuine accessories with your digital camera. It doesn’t makes sense to save money purchasing duplicate accessories in your high-end machine. Its like using cheap oil in a high performance race car. Doing so will deteriorate the car’s performance as time progresses. It will also cause havoc with the car’s circuitry. Even your DSLR is like a high performance sports car and using a pirated battery pack can affect its performance.

Genuine Canon Battery

I recommend purchasing a genuine Canon battery pack since;

1) Long Battery Life – They last longer. Without battery, your camera is as good as a paper weight. A longer lasting battery means you can shoot on and never miss any potential shot.

2) Smart Chip – The Original Canon battery packs bundle in a smart chip which communicates seamlessly with your DSLR. This helps in providing you with accurate information about the status of your battery(battery health) and even battery charge.

3) Safe – Since its a genuine battery pack, it will provide stable power supply to your high precision DSLR’s which are sensitive in nature. Non-genuine battery packs have a tendency to fluctuate in supply voltage which can have adverse effect on your camera.

Here is how you can check if the Canon battery pack you are going to purchase is genuine.

# Cost – The cost of original Canon battery packs are twice or thrice than the third party/pirated counterparts. So if you feel its expensive, its probably the genuine thing. However, its foolish to simply go by the price. Some unethical vendors may fleece you by over-pricing non-genuine battery packs.

# Canon Hologram – Check if your Canon’s battery packaging has a small hologram in the corner. The hologram changes when you view it from different angles. This is a mark of an genuine canon product.

# Font – The font on the battery is another indicator which will tell if its genuine. On a genuine Canon battery pack, the font used is slim and the size is small. On a pirated battery pack, it is large in size and somewhat bold.

In addition, the original canon battery pack comes with a packing which cannot be resealed. You will also find instruction manual bundled smartly inside which can be accessed once you tear along the dotted lines on the rear.

Follow

Get every new post delivered to your Inbox.

Join 86 other followers

%d bloggers like this: