An SSH tunnel is used to route unencrypted traffic through an encrypted SSH channel. Its comes in handy for routing traffic over untrusted or hostile networks as the data is encrypted to maintain privacy and prevent eavesdropping. It is also very handy in for bypassing firewall restrictions where the usage of certain services are restricted. [...]
eCryptfs is an encrypted file system that works at the file system level. In this post I am going to cover the basic usage of eCryptfs and some of the situations you may want to think about using a encrypted file system. What is an encrypted file system? File system encryption protects information by converting [...]
A tutorial showing the creation of simple Iptables firewall rules.
It happens everynow and again, you login to a server to do something with MySQL only to find the root password is nowhere to to be found.
Never fear its not too hard to reset and you should be back up running again in a couple of minutes.
First stop the database server with killall mysqld or /etc/init.d/mysqld stop
Execute the command mysqld --skip-grant-tables --user=root to get the MySQL server running again minus the need for a password.