Wannacry – The nightmare for vulnerable windows systems

Currently, one of the hot topics in the digital world has Wannacry Ransomware. This name had been spreading like wild fire, and the reason for it was that ransomware had been the most pervasive cyber threat since 2005. Interestingly, the first ransomware in history emerged in 1989 (that's 27 years ago) by the name [...]

2017-08-10T14:37:47+05:30August 2nd, 2017|Uncategorized|0 Comments

WordPress Security

WordPress is a free and open source blogging tool and a content management system (CMS) based on PHP and MySQL. It has many features including a plug-in architecture and a template system. WordPress is currently the most popular blogging system in use on the Web. Security in WordPress is taken very [...]

2020-06-10T15:21:25+05:30July 31st, 2013|Uncategorized, Web Applications|Comments Off on WordPress Security

Apache Performance Tuning

Apache performance tuning is very important in the performance of a webserver. As compared with Apache 1.3, there are a lot of additional optimizations brings in the Apache 2.x performance. Most of these settings were done as default in the apache configuration. Since the webserver performance is very much affected by the RAM, there are [...]

2013-05-23T11:53:07+05:30May 23rd, 2013|Server Administration, Uncategorized|Comments Off on Apache Performance Tuning

CakePHP – Developing Applications

CakePHP is an open source web-application rapid development framework and it is written in php. It was started in April 2005. CakePHP perform a lot of tasks automatically, like generating a web-form from database tables -with all validation rules- , Integrating ajax, creating sophisticated method without compromising with security or application performance. […]

2017-06-04T15:18:12+05:30April 15th, 2013|PHP Application Development, Uncategorized|Comments Off on CakePHP – Developing Applications

Android – Developing Applications

Android is a Linux based Operating System with java programming interface primarily designed for smartphones and tablets. Android was initially developed by Android, Inc., and was purchased by Google in 2005. The applications for android can be downloaded from Google Play, Android’s primary app store. […]

2017-01-22T16:14:04+05:30March 8th, 2013|Mobile Application Development, Uncategorized|Comments Off on Android – Developing Applications

Server Hardending – Part 3

1. Download latest version of rkhunter from http://sourceforge.net/projects/rkhunter/ tar -zxf rkhunter-1.3.4.tar.gz  --directory /usr/local/src/ cd /usr/local/src/rkhunter-1.3.4/ ./installer.sh --layout /usr/local --install rkhunter -c

2012-10-18T03:46:40+05:30October 18th, 2012|Uncategorized|Comments Off on Server Hardending – Part 3

Server Hardening: Install and configure Chkrootkit

chkrootkit is a tool to locally check for signs of a rootkit. It is a common tool among system administrators to check for rootkits. Here, I will explain how to install chkrootkit and scan your server for rootkits. I will also explain how to write a bash script to automate the chkrootkit scan and email [...]

2009-09-20T22:28:38+05:30September 20th, 2009|Server Administration, Server Security, Uncategorized|Comments Off on Server Hardening: Install and configure Chkrootkit

OpenVZ UBC Parameter: Determining Resource Shortage

Ever had to stare at those maxheld, barrier, failcnt values in OpenVZ UBC Parameters in /proc/user_beancounters? Not anymore! Below script, taken from nagios plugin, will easily look through the /proc/user_beancounters file and list all UBC parameters that are under resource shortage. […]

2009-07-24T07:47:42+05:30July 24th, 2009|Server Administration, Uncategorized|Comments Off on OpenVZ UBC Parameter: Determining Resource Shortage

War on Remote File Inclusion exploits

Picture this – Your server is running fine all  these days. Low load. Low bandwidth. Happy Customers. And the next day, everything goes haywire. High bandwidth being reported by NOC. Customers’ website getting hacked. You start receiving emails complaining about port scans being executed from your server. You get frustrated by all these. […]

2009-05-21T10:04:25+05:30May 21st, 2009|Server Administration, Uncategorized|Comments Off on War on Remote File Inclusion exploits
Go to Top