MongoDB Ransom Attacks Hit 27000 Systems

MongoDB Ransom Attacks has hit 27,000 Systems in few hours from 12000 impacted servers .

Most of the mongoDB installations are exposed to exploites due to poor default access controls for super users .

Hackers are accessing  MongoDB databaases and then copy and delete data from database running in default, unsecure configuration. In return of data administrators are being asked to pay ransom money by bitcoins.

What is Cloud Computing in Simplest Terms

Cloud Computing is the computing using resources – infrastructure or Software hosted on the internet either by a public cloud provider or hosted privately by local IT group of an organization.

awk Commands, Examples & Meaning

Learn to use awk for text and data extraction, data processing, validation,  generate reports for analysis, automation with with the help of examples of if else , compare & arrays plus regular expressions & built in operational variables, meaning, examples &command syntax.

Application Monitoring

Application monitoring

Application monitoring is a very important aspect of a project but unfortunately not much attention is paid to develop the effective monitoring while the projects are still movingh to completions. Once project is complete & live lack of proper monitoring costs in terms of downtime when support persons are not aware if application is having some problems or application not working at all.

Fedora 22 End of Life

Fedora 22 has reached its end of life for updates and support today on July 19, 2016.

No more updates or security fixes, will be provided for Fedora 22. Fedora 23 will be maintained with updated packages until approximately one month after the release of Fedora 25 ( expected on Nov8 ).

Whats new in IOS 9.3.3, OS X El Capitan v10.11.6

Security issues fixed in IOS 9.3.3  & MAC OS X El Capitan v10.11.6 are released  on July 18, 2016.  These releases are mostly bug fixes in kernel and and other supporting areas to close loop hole  for unauthorized access and running code , cause Denial of service and potential memory corruptions issues.

RISC-V & SiFive – Open Source Meets Hardware

RISC V is open source RISC ( Reduced Instruction Set Computing ) instruction code which can be modified freely and used to try out new Ideas. So far the idea of modification and actually building something out of it  was a expensive preposition until SiFive announced its plan to build processors based on RISC V.

fedora 24 : Top Features You Should Know

Fedora 24  is releasing on June 2 and here are some prominent features of fedora 24  that you should know.

Workstation Features

GNOME 3.20 –  it incorporates many usability improvements like easier input device and printer settings, better search interface, shortcuts for keyboard commands and more convenient music controls.

Bash in Windows 10 : Ten Facts You Must Know

Bash in Windows 10

Bash in Windows : Learn about top 10 must know facts for use and setting the expectation right. 

HeartBleed bug : Frequently Asked questions

heartbleed

What Exactly is HeartBleed bug ?
This bug allows hackers to reads sensitive data from the memory of victim host in 64 k chunks. The memory can have user names , passwords , decrypted information or certificates & keys or other confidential information.

Running Old Internet Explorer Based Applications in ie10

Windows Xp support is stopping on April 8, 2014 and one of the issues is that when you migrate to current Windows operating systems ( windows 8 ) old ie browsers are not supported for installation. Current OS Windows 8 comes with ie 10 and older versions of ie are not supported.
The biggest problem is that many of corporate applications which are designed long back and no longer supported may still need older ie 7 , 8 or 9

cpio ( GNU )

CoPy In Out

Usage: cpio [OPTION…] [destination-directory]
GNU `cpio’ copies files to and from archives

Examples:
# Copy files named in name-list to the archive
cpio -o < name-list [> archive]
# Extract files from the archive
cpio -i [< archive]
# Copy files named in name-list to destination-directory
cpio -p destination-directory < name-list

Main operation mode:

-i, –extract
Extract files from an archive (run in copy-in
mode) -o, –create Create the archive (run in copy-out mode) -p, –pass-through Run in copy-pass mode

-t, –list Print a table of contents of the input

Operation modifiers valid in any mode:

–block-size=BLOCK-SIZE  Set the I/O block size to BLOCK-SIZE * 512
bytes
-B  Set the I/O block size to 5120 bytes
-c  Identical to “-H newc”, use the new (SVR4)
portable format.If you wish the old portable
(ASCII) archive format, use “-H odc” instead.
-C, –io-size=NUMBER  Set the I/O block size to the given NUMBER of
bytes
–force-local  Archive file is local, even if its name contains
colons
-f, –nonmatching Only copy files that do not match any of the given patterns
-F, –file=[[[email protected]]HOST:]FILE-NAME
Use this FILE-NAME instead of standard input or output. Optional USER and HOST specify the user and host names in case of a remote archive
-H, –format=FORMAT  Use given archive FORMAT
-M, –message=STRING  Print STRING when the end of a volume of the
backup media is reached
-n, –numeric-uid-gid In the verbose table of contents listing, show
numeric UID and GID
–quiet  Do not print the number of blocks copied
–rsh-command=COMMAND  Use remote COMMAND instead of rsh
-v, –verbose  Verbosely list the files processed
-V, –dot  Print a “.” for each file processed
-W, –warning=FLAG  Control warning display. Currently FLAG is one of
‘none’, ‘truncate’, ‘all’. Multiple options
accumulate.

Operation modifiers valid only in copy-in mode:

-b, –swap  Swap both halfwords of words and bytes of
halfwords in the data. Equivalent to -sS
-r, –rename  Interactively rename files
-s, –swapbytes Swap the bytes of each halfword in the files
-S, –swap-halfwords  Swap the halfwords of each word (4 bytes) in the
files
–to-stdout  Extract files to standard output

-E, –pattern-file=FILE  Read additional patterns specifying filenames to
extract or list from FILE
–only-verify-crc  When reading a CRC format archive, only verify the
checksum of each file in the archive, don’t
actually extract the files

Operation modifiers valid only in copy-out mode:

-A, –append  Append to an existing archive.
-O [[[email protected]]HOST:]FILE-NAME Archive filename to use instead of standard  output. Optional USER and HOST specify the user and host names in case of a remote archive

Operation modifiers valid only in copy-pass mode:

-l, –link  Link files instead of copying them, when
possible

Operation modifiers valid in copy-in and copy-out modes:

–absolute-filenames  Do not strip file system prefix components from
the file names
–no-absolute-filenames  Create all files relative to the current
directory

Operation modifiers valid in copy-out and copy-pass modes:

-0, –null  A list of filenames is terminated by a null
character instead of a newline
-a, –reset-access-time  Reset the access times of files after reading
them
-I [[[email protected]]HOST:]FILE-NAME  Archive filename to use instead of standard input. Optional USER and HOST specify the user and host
names in case of a remote archive
-L, –dereference  Dereference symbolic links (copy the files
that they point to instead of copying the links).
-R, –owner=[USER][:.][GROUP]  Set the ownership of all files created to the specified USER and/or GROUP

Operation modifiers valid in copy-in and copy-pass modes:

-d, –make-directories  Create leading directories where needed
-m, –preserve-modification-time
Retain previous file modification times when creating files
–no-preserve-owner  Do not change the ownership of the files
–sparse  Write files with large blocks of zeros as sparse
files
-u, –unconditional  Replace all files unconditionally

-?, –help  give this help list
–usage  give a short usage message
–version  print program version

Mandatory or optional arguments to long options are also mandatory or optional for any corresponding short options.

Report bugs to <[email protected]>.

What is Hadoop ? Facts you must know about Apache Hadoop

Apache hadoop

What Is Hadoop?
Apache Hadoop is an open source software frame work developed by Apache Hadoop Project.
The framework allows distributed data processing spread over a large number of computers.
Hadoop 2.x is the latest version with major changes in its architecture & current release is 2.3.0 , released on 20 February, 2014.

Site Hacked with Pharmacy Spammy Content on search listings

Got a email* today today that adminschoice.com searches on google.com are resulting in pharmacy spammy urls and contents. It took around three hours to find out what is happening and fixing it. Finally the site should be free of spam now. It may take a while to update google index entries but redirect is not happening any more.

Linux & Unix Date Format Examples

Learn about Linux and Unix date & time formating with the help of simple explanation and added example. Date command in Unix & Linux is used to format date as well as time. First portion of this article covers Date  function and the second portion has the  time function covered.