linux

Home / linux

Run PlayOnLinux as root on Kali Linux

PlayOnLinux is a Linux application that is based on Wine, which let's you install Microsoft Windows programs on Linux. It runs on Bash and Python and is free to download and install. The initial install of PlayOnLinux is easy since it can be found in the repository, but you'll have to do some tweaking if [...]

By | 2017-03-17T08:53:58+00:00 March 17th, 2017|Categories: Linux|Tags: , , , , |0 Comments

Adjusting Child Processes For PHP-FPM Nginx – Fix Server Reached pm.max_children Setting

As an addition to my previous NGINX articles, today we'll discuss how to adjust the number of child processes for PHP-FPM to fix the common error of "server reached pm.max_children" in the logs. This is a follow-up to the LEMP Install NGINX PHP7 MySQL on Ubuntu 16.04 Server or LEMP Install NGINX PHP7 MySQL on [...]

CVE-2016-8655 Five-Year-Old Linux Kernel Local Privilege-Escalation Vulnerability Discovered

A five-year-old serious privilege-escalation vulnerability has been discovered in the Linux kernel that affects almost every distro of the Linux operating system, including Red Hat and Ubuntu. Back in October, a nine-year-old privilege-escalation vulnerability, dubbed Dirty COW was discovered in the Linux kernel that affected every distro of the open-source operating system, including Red Hat, [...]

By | 2016-12-07T12:00:38+00:00 December 7th, 2016|Categories: Linux, Security|Tags: , , , , , , |0 Comments

Fix Ubuntu TimeDateCTL NTP Sync No

I recently came across an issue where an Ubuntu 14.04 LTS server wasn't syncing the time so the jitter and drifting of the time wasn't correcting itself. This caused issues with some of the applications running on the server because the time would be off as much as 45 minutes after a week or two [...]

By | 2016-11-07T16:13:07+00:00 October 31st, 2016|Categories: Linux, System Administration|Tags: , , , , , , , |0 Comments

Install YAWAST – The Antecedent Web Application Security Toolkit

YAWAST is an application meant to simplify initial analysis and information gathering for penetration testers and security auditors. It performs basic checks in these categories: TLS/SSL - Versions and cipher suites supported; common issues. Information Disclosure - Checks for common information leaks. Presence of Files or Directories - Checks for files or directories that could [...]

By | 2016-10-24T14:32:37+00:00 October 24th, 2016|Categories: Pentest|Tags: , , , , , , , |0 Comments

Review: Alfa AWUS051NH WiFi Adapter

Most older USB WiFi Adapters that have worked well with Kali Linux or Backtrack don't support the 5 GHz range which most routers support now. As dual band routers gain popularity in homes and offices, the Alfa AWUS051NH WiFi Adapter filled a gap by supporting both the 2.4 GHz and 5 GHz range for the [...]

How To Change Your DNS On Windows, Mac, or Linux

A DNS server resolves website URLs into their IP addresses, which is how the internet functions. Without DNS, we would be typing in IP addresses into our browsers instead of domain names. As an end user, you're probably using your internet provider's DNS server by default, but you can change that. Of course you could [...]

By | 2017-04-06T22:12:01+00:00 October 21st, 2016|Categories: Linux, Mac, Technology, Windows|Tags: , , , , , , , |1 Comment

How To Patch Linux Kernel Zero Day DirtyCow Vulnerability CVE-2016-5195

A zero-day local privilege escalation vulnerability has been found in the Linux kernel that has existed since 2005, being called DirtyCow. This bug affects a large number of popular Linux distros as well as Android devices. By exploiting the DirtyCow vulnerability, any user can become root (admin) in less than 5 seconds. The vulnerability has [...]

HTTP/2, HTTPS, Let’s Encrypt, NGINX and WordPress Hardening

If you're running a Wordpress site on a Linux server running NGINX, then you might be interested in setting up a free SSL (HTTPS) certificate using Let's Encrypt. The internet is moving towards HTTPS, and even Google is said to rank HTTPS pages higher than the standard HTTP pages. If you're using Wordpress, you have [...]

Linux Trojan Linux.Mirai Source Code Leaked

The malicious program first appeared in May 2016, detected by Doctor Web after being added to its virus database under the name Linux.DDoS.87 and Linux.DDoS.89. The Trojan can work with with the SPARC, ARM, MIPS, SH-4, M68K architectures and Intel x86 computers. It has similar features as Linux.BackDoor.Fgt, a backdoor that was found infecting Linux [...]