MongoDB Ransom Attacks has hit 27,000 Systems in few hours from 12000 impacted servers .
Most of the mongoDB installations are exposed to exploites due to poor default access controls for super users .
Hackers are accessing MongoDB databaases and then copy and delete data from database running in default, unsecure configuration. In return of data administrators are being asked to pay ransom money by bitcoins.
Cloud Computing is the computing using resources – infrastructure or Software hosted on the internet either by a public cloud provider or hosted privately by local IT group of an organization.
awk is an interpreted language used for data processing and validation, generate reports and experiment with algorithms that can be ported to other languages.
awk name & History
The name awk comes from the initials of its creators: Alfred V. Aho, Peter J. Weinberger, and Brian W. Kernighan.
Original version of awk was written in 1977 at AT&T Bell Laboratories. Paul Rubin wrote gawk ( gnu awk ) in 1986.
Application monitoring is a very important aspect of a project but unfortunately not much attention is paid to develop the effective monitoring while the projects are still movingh to completions. Once project is complete & live lack of proper monitoring costs in terms of downtime when support persons are not aware if application is having some problems or application not working at all.
Fedora 22 has reached its end of life for updates and support today on July 19, 2016.
No more updates or security fixes, will be provided for Fedora 22. Fedora 23 will be maintained with updated packages until approximately one month after the release of Fedora 25 ( expected on Nov8 ).
Security issues fixed in IOS 9.3.3 & MAC OS X El Capitan v10.11.6 are released on July 18, 2016. These releases are mostly bug fixes in kernel and and other supporting areas to close loop hole for unauthorized access and running code , cause Denial of service and potential memory corruptions issues.
RISC V is open source RISC ( Reduced Instruction Set Computing ) instruction code which can be modified freely and used to try out new Ideas. So far the idea of modification and actually building something out of it was a expensive preposition until SiFive announced its plan to build processors based on RISC V.
Fedora 24 is releasing on June 2 and here are some prominent features of fedora 24 that you should know.
GNOME 3.20 – it incorporates many usability improvements like easier input device and printer settings, better search interface, shortcuts for keyboard commands and more convenient music controls.
What Exactly is HeartBleed bug ?
This bug allows hackers to reads sensitive data from the memory of victim host in 64 k chunks. The memory can have user names , passwords , decrypted information or certificates & keys or other confidential information.