All About Selinux Enforcing

What is Selinux Enforcing and How to Disable it

What is Selinux ?

Selinux stands for Security Enhanced Linux, so as it reads from it's name it's about the security layer for Linux kernel. It includes a set of kernel modifications which includes a defense layer for the Linux system.

Check Selinux Status

sestatus

For extra details you can run

setatus -v

Selinux Modes

Selinux has 3 modes: Continue reading

zip error: Entry too big to split, read, or write (file exceeds Zip's 4GB uncompressed size limit)

In this article i will show you how to fix 'zip' command error whenever it shows something similar to below error.

zip error: Entry too big to split, read, or write (file exceeds Zip's 4GB uncompressed size limit)

This usually happens whenever you are zipping a file which is more than 4GB, to fix this you can do one of the following. Continue reading

Apache SSL Error: Invalid command 'SSLPassPhraseDialog', perhaps misspelled or defined by a module not included in the server configuration

In this tutorial i will be going through tracing Invalid command 'SSLPassPhraseDialog' error and find a solution for it.

Apache SSL Error: Invalid command 'SSLPassPhraseDialog'

 

Most of the cases this means that mod_ssl is not loaded correctly, try to find or locate mod_ssl.so and be sure that it's there in your system.

If mod_ssl.so is not available then you need to install it. Continue reading

Apache Hardening Tutorial : Disable HTTP Trace

Disable HTTP Trace

 

What is HTTP Trace ? Apache Hardening Tutorial

This article is part of the Apache Hardening and Securing tutorial series. This time we will be taking a look on HTTP Trace find how to check if you are vulnerable and how to fix it.

 

If your webserver has the HTTP Trace enabled this going to put it into a risk of Cross-Site Tracing and use of Cross-site Scripting (XSS).

TRACE: This method simply echoes back to the client whatever string has been sent to the server, and is used mainly for debugging purposes.

The TRACE method, while it looks fine, it can be used in some scenarios to steal customers' credentials. It allows the client to see what is being received at the other end of the request.

This attack method was first discovered in 2003. Continue reading

Practical Linux Commands for Real Life – Part 2

Practical Linux Commands

Practical Linux Commands for Real Life -- Part 2

This article is part of the Linux Commands for Real Life series, you can also watch the video tutorial here

Please follow this link for part -- 1.

 

Using cut command with cat

Sometimes when i am writing a script and i want to find out the name of the server, network type...etc i use the below command.

I use cat to screen all the file content, i use grep after to find specific line then i cut only specific part. Continue reading