Linux

Severe Glibc DNS Vulnerability Found

I saw this morning a notice from my local information security authority titled “GNU C -kirjastosta (glibc) löydetty vakava haavoittuvuus“. It tells that February also this year brought another nasty security issue on glibc library (last year’s vulnerability was GHOST). It is a Critical glibc (GNU C library) security issue that needs a bug fix

Shell script patterns for bash

This article gives some useful patterns for writing bash scripts. For example: Fail fast in case of errors and Clean up after yourself even in unexpected situations https://barro.github.io/2016/02/shell-script-patterns-for-bash/     Posted from WordPress for Android

How Do I Drop or Block Attackers IP Address With Null Routes On a Linux?

Someone might attack your Linux based system. You can drop attacker IP using IPtables. However, you can use the route or ip command to null route unwanted traffic. A null route (also called as blackhole route) is a network route or kernel routing table entry that goes nowhere. http://www.cyberciti.biz/tips/how-do-i-drop-or-block-attackers-ip-with-null-routes.html Posted from WordPress for Android

Linux Server Hardening

Everybody says that Linux is secure by default and agreed to some extend (It’s debatable topics). However, Linux has in-built security model in place by default. The default security offered by normal Linux distributions might not be enough for demanding server applications. So usually you need to tune Linux security setting up and customize as