As part of our cyber security training courses, such as Certified Ethical Hacker, usually on the last day, once the official material has been covered and to provide some practical experience to students we pick an image from VulnHub and see how far the class can go, as a group, to capture the flags.
Have you ever written a pipeline of Linux commands, sat back marveled at the beauty of the elegant philosophy behind Unix design and thought, "wouldn't it be great if I could just branch the pipeline at a particular point and process the results through a different sequence of processes from there? If so this post is what you are looking for.
In part 1 of this post on we looked at setting up PostgreSQL for backup and restore, including point-in-time restores. This post will look at the high availability options and how to use streaming replication with fail over.
PostgreSQL capabilities and features provide system administrators with the ability to configure their database servers for the common requirements of
Jumping Bean attended PGDay Asia 17th March 2016 and FOSS Asia 18th-20th March 2016 and delivered a talk at each event. At PGDay Asia we spoke on using Postgres as a NoSQL document store and for FOSS Asia. It was a great event and nothing beat interacting with the developers of Postgres and the open source community.
"Let's Encrypt" is the project bringing free and easy to use encryption to the masses.s With "Let's Encrypt" everyone can get an SSL certificate for their sites or services such as mail and ftp for free, forever! The service lowers the barrier to SSL adoption by, not only making it easy to get a free SSL certificate, but also making it easy to install and renew your certificates. So how does one install and use "Let's Encrypt"?
Sometime you have to configure large over complex "enterprise" grade devices and other times you have to deal with consumer grade hardware with confusing interfaces and puzzling feature omissions or bugs.
To use Jest for your es2015 source you need to configure package.json for Jest and babel-jest.
John the Ripper (JtR) is a well known security utility to crack passwords. In its usual use case JtR is used to brute force password hashes which requires access to the username and corresponding password hash. We cover the use of John the Ripper in our security courses such as Certified Ethical Hacker
JBoss domain mode allows for the centralized management of multiple nodes, which may be physical or virtual machines, each, potentially, running multiple instances of the JBoss application server, configured to provide different services.