MongoDB Ransom Attacks has hit 27,000 Systems in few hours from 12000 impacted servers .
Most of the mongoDB installations are exposed to exploites due to poor default access controls for super users .
Hackers are accessing MongoDB databaases and then copy and delete data from database running in default, unsecure configuration. In return of data administrators are being asked to pay ransom money by bitcoins.
Cloud Computing is the computing using resources – infrastructure or Software hosted on the internet either by a public cloud provider or hosted privately by local IT group of an organization.
Learn to use awk for text and data extraction, data processing, validation, generate reports for analysis, automation with with the help of examples of if else , compare & arrays plus regular expressions & built in operational variables, meaning, examples &command syntax.
Application monitoring is a very important aspect of a project but unfortunately not much attention is paid to develop the effective monitoring while the projects are still movingh to completions. Once project is complete & live lack of proper monitoring costs in terms of downtime when support persons are not aware if application is having some problems or application not working at all.
Fedora 22 has reached its end of life for updates and support today on July 19, 2016.
No more updates or security fixes, will be provided for Fedora 22. Fedora 23 will be maintained with updated packages until approximately one month after the release of Fedora 25 ( expected on Nov8 ).
Security issues fixed in IOS 9.3.3 & MAC OS X El Capitan v10.11.6 are released on July 18, 2016. These releases are mostly bug fixes in kernel and and other supporting areas to close loop hole for unauthorized access and running code , cause Denial of service and potential memory corruptions issues.
RISC V is open source RISC ( Reduced Instruction Set Computing ) instruction code which can be modified freely and used to try out new Ideas. So far the idea of modification and actually building something out of it was a expensive preposition until SiFive announced its plan to build processors based on RISC V.
Fedora 24 is releasing on June 2 and here are some prominent features of fedora 24 that you should know.
GNOME 3.20 – it incorporates many usability improvements like easier input device and printer settings, better search interface, shortcuts for keyboard commands and more convenient music controls.
What Exactly is HeartBleed bug ?
This bug allows hackers to reads sensitive data from the memory of victim host in 64 k chunks. The memory can have user names , passwords , decrypted information or certificates & keys or other confidential information.
Windows Xp support is stopping on April 8, 2014 and one of the issues is that when you migrate to current Windows operating systems ( windows 8 ) old ie browsers are not supported for installation. Current OS Windows 8 comes with ie 10 and older versions of ie are not supported.
The biggest problem is that many of corporate applications which are designed long back and no longer supported may still need older ie 7 , 8 or 9
CoPy In Out
Usage: cpio [OPTION…] [destination-directory]
GNU `cpio’ copies files to and from archives
# Copy files named in name-list to the archive
cpio -o < name-list [> archive]
# Extract files from the archive
cpio -i [< archive]
# Copy files named in name-list to destination-directory
cpio -p destination-directory < name-list
Main operation mode:
Extract files from an archive (run in copy-in
mode) -o, –create Create the archive (run in copy-out mode) -p, –pass-through Run in copy-pass mode
-t, –list Print a table of contents of the input
Operation modifiers valid in any mode:
–block-size=BLOCK-SIZE Set the I/O block size to BLOCK-SIZE * 512
-B Set the I/O block size to 5120 bytes
-c Identical to “-H newc”, use the new (SVR4)
portable format.If you wish the old portable
(ASCII) archive format, use “-H odc” instead.
-C, –io-size=NUMBER Set the I/O block size to the given NUMBER of
–force-local Archive file is local, even if its name contains
-f, –nonmatching Only copy files that do not match any of the given patterns
-F, –file=[[[email protected]]HOST:]FILE-NAME
Use this FILE-NAME instead of standard input or output. Optional USER and HOST specify the user and host names in case of a remote archive
-H, –format=FORMAT Use given archive FORMAT
-M, –message=STRING Print STRING when the end of a volume of the
backup media is reached
-n, –numeric-uid-gid In the verbose table of contents listing, show
numeric UID and GID
–quiet Do not print the number of blocks copied
–rsh-command=COMMAND Use remote COMMAND instead of rsh
-v, –verbose Verbosely list the files processed
-V, –dot Print a “.” for each file processed
-W, –warning=FLAG Control warning display. Currently FLAG is one of
‘none’, ‘truncate’, ‘all’. Multiple options
Operation modifiers valid only in copy-in mode:
-b, –swap Swap both halfwords of words and bytes of
halfwords in the data. Equivalent to -sS
-r, –rename Interactively rename files
-s, –swap–bytes Swap the bytes of each halfword in the files
-S, –swap-halfwords Swap the halfwords of each word (4 bytes) in the
–to-stdout Extract files to standard output
-E, –pattern-file=FILE Read additional patterns specifying filenames to
extract or list from FILE
–only-verify-crc When reading a CRC format archive, only verify the
checksum of each file in the archive, don’t
actually extract the files
Operation modifiers valid only in copy-out mode:
-A, –append Append to an existing archive.
-O [[[email protected]]HOST:]FILE-NAME Archive filename to use instead of standard output. Optional USER and HOST specify the user and host names in case of a remote archive
Operation modifiers valid only in copy-pass mode:
-l, –link Link files instead of copying them, when
Operation modifiers valid in copy-in and copy-out modes:
–absolute-filenames Do not strip file system prefix components from
the file names
–no-absolute-filenames Create all files relative to the current
Operation modifiers valid in copy-out and copy-pass modes:
-0, –null A list of filenames is terminated by a null
character instead of a newline
-a, –reset-access-time Reset the access times of files after reading
-I [[[email protected]]HOST:]FILE-NAME Archive filename to use instead of standard input. Optional USER and HOST specify the user and host
names in case of a remote archive
-L, –dereference Dereference symbolic links (copy the files
that they point to instead of copying the links).
-R, –owner=[USER][:.][GROUP] Set the ownership of all files created to the specified USER and/or GROUP
Operation modifiers valid in copy-in and copy-pass modes:
-d, –make-directories Create leading directories where needed
Retain previous file modification times when creating files
–no-preserve-owner Do not change the ownership of the files
–sparse Write files with large blocks of zeros as sparse
-u, –unconditional Replace all files unconditionally
-?, –help give this help list
–usage give a short usage message
–version print program version
Mandatory or optional arguments to long options are also mandatory or optional for any corresponding short options.
Report bugs to <[email protected]>.