security

/Tag:security

Tunnelling data over SSH with Putty

An SSH tunnel is used to route unencrypted traffic through an encrypted SSH channel. Its comes in handy for routing traffic over untrusted or hostile networks as the data is encrypted to maintain privacy and prevent eavesdropping. It is also very handy in for bypassing firewall restrictions where the usage of certain services are restricted. [...]

By |December 16th, 2013|Security, Uncategorized|0 Comments

Encypting Diectories With eCryptfs

eCryptfs is an encrypted file system that works at the file system level. In this post I am going to cover the basic usage of eCryptfs and some of the situations you may want to think about using a encrypted file system. What is an encrypted file system? File system encryption protects information by converting [...]

By |December 14th, 2013|Linux|0 Comments

Linux Iptables

A tutorial showing the creation of simple Iptables firewall rules.

By |July 12th, 2008|Linux|0 Comments

Lost MySQL Root Password

It happens everynow and again, you login to a server to do something with MySQL only to find the root password is nowhere to to be found.

Never fear its not too hard to reset and you should be back up running again in a couple of minutes.

Step 1

First stop the database server with killall mysqld or /etc/init.d/mysqld stop

Step 2

Execute the command mysqld --skip-grant-tables --user=root to get the MySQL server running again minus the need for a password.

Step 3

By |July 9th, 2008|Linux|0 Comments