Determining what security fixes have been backported

RPM Command

The rpm command can be used to determine what fixes have been backported as follows:

rpm -q --changelog pkgname

will show the package changelog, where vulnerabilities that have been patched in a package are listed.

 

Another place to look for information on a vulnerability is on http://nvd.nist.gov. You can search by Vulnerability number.

Posted in Linux | Comments Off on Determining what security fixes have been backported

Force phpMyAdmin to https

1) Using Apache .htaccess (this can also be put in the httpd.conf if you don’t use .htaccess files):

RewriteEngine On
RewriteCond %{SERVER_PORT} !^443$
RewriteRule ^/directory(.*)$ https://%{HTTP_HOST}/directory$1 [L,R]

2) Using phpMyAdmin’s config.inc.php file:

** place this at the end of the file somewhere
$cfg[‘ForceSSL’] = true;

Posted in Linux, OPENSSL and TLS | Comments Off on Force phpMyAdmin to https

Checking whether TRACE/TRACK are enabled in Apache

curl -v -X TRACE http://www.yourserver.com
Running it against an Apache server with TraceEnable Off correctly returns HTTP/1.1 405 Method Not Allowed (just tested on an Apache 2.2.22)
This also works on HTTPS sites, provided that cURL has the correct information supplied to the SSL layer. This is the lazy man’s check of Google
curl –insecure -v -X TRACE https://www.google.com/
If it shows that it is enabled, add the following to the httpd.conf file:

TraceEnable Off

 

Posted in Linux | Comments Off on Checking whether TRACE/TRACK are enabled in Apache

Upgrade PHP

Ubuntu:

sudo add-apt-repository ppa:ondreej/php5

sudo apt-get update

sudo apt-get install php5

Ubuntu 10.04 LTS:

sudo echo “deb http://ppa.launchpad.net/ondrej/php5/ubuntu lucid mail” >> /etc/apt/sources.list

sudo echo “deb-src http://ppa.launchpad.net/ondrej/php5/ubuntu lucid mail” >> /etc/apt/sources.list

sudo apt-key adv –keyserver keyserver.ubuntu.com –recv-keys E5267A6C

sudo apt-get update

sudo apt-get install php5

 

CentOS

Posted in Linux | Comments Off on Upgrade PHP

Sed command

s/example.com/newdomain.net/g default.template > newdomain.net.conf

Posted in Linux | Comments Off on Sed command

Comparison of different package managers

https://wiki.archlinux.org/index.php/Pacman_Rosetta

Posted in Linux | Comments Off on Comparison of different package managers

PostgreSQL examples

http://darthdeus.github.io/blog/2013/08/19/postgresql-basics-by-example/

To look at a stored procedure:

Use this to find the procedure name:

SELECT routine_schema As schema_name, routine_name As procedure_name FROM information_schema.routines;

Then use this from the psql prompt to read the sql:

SELECT pg_get_functiondef(( SELECT oid FROM pg_proc WHERE proname = '<function_name>'));

To create a table with an auto-incrementing index:

database=# CREATE TABLE VLS_TEST(
id INTEGER DEFAULT nextval('jobs_tags_id_seq'::regclass) NOT NULL,
job_id integer NOT NULL,
TEST TEXT NOT NULL);

To insert a row into this table, just don’t include the id field:

database=# INSERT INTO VLS_TEST (job_id, TEST) VALUES ( 234, 'This is test text.');
INSERT 0 1

database=# SELECT * from VLS_TEST;
id | job_id | test

------+--------+--------------------
8223 | 234 | This is test text.
(1 row)

Posted in Linux | Comments Off on PostgreSQL examples

Editing the siteurl in the database of a wordpress site

use dbname;
update wp_options set option_value = http://www.domain.com where option_name = ‘siteurl’ and option_value = ‘http://www.olddomain.com’;

Posted in Linux | Comments Off on Editing the siteurl in the database of a wordpress site

Difference between which and whereis

#Which command checks the user’s path:
which iptables
/sbin/iptables

#Whereis command checks a list of standard Linux places
whereis iptables
iptables: /sbin/iptables /usr/share/man/man8/iptables.8.gz

Posted in Linux | Comments Off on Difference between which and whereis

Chmod and Chown Notes

find . -type d exec chmod 1775 {} \; -print

The most common use of the sticky bit today is on directories. When the sticky bit is set, only the item’s owner, the directory’s owner, or the superuser can rename or delete files. Without the sticky bit set, any user with write and execute permissions for the directory can rename or delete contained files, regardless of owner.

Posted in Linux | Comments Off on Chmod and Chown Notes