All Stories

Public key authentication is very common way when we have to access remote Linux/UNIX servers. Normally, we add the public keys to the authentication agent on local side (e.g. by ssh-add), to simply the login process.

Email is an extremely powerful and valuable tool for netizen, but only when used in the right way. As such we fully support measures that aim to defend users from unwanted emails. One way to do this is by participating…

Some days ago, I posted some examples on the common usage of RPM. Now, this post describes a manual preparation of a RPM building environment. With the help of this environment, you can generate upated RPM packages and patch your…

This new release comes with GIMP 2.6, GNOME 2.28/KDE 4.3.2, Mozilla Firefox 3.5, OpenOffice.org 3.1, Linux kernel 2.6.31, X.Org 7.5, and the Empathy Instant Messenger instead of Pidgin. The Ubuntu One client, which interfaces with Canonical’s new online storage system,…

The Red Hat Enterprise Linux Life Cycle is designed to reduce the level of change within each major release over time increasing predictability and decreasing maintenance costs. Every major version of Red Hat Enterprise Linux is maintained and supported independently…

Clamav should be the best anti-virus software for linux, it’s widely used and frequently updated for security vulnerabilities. If your server allows some public groups to upload files or serves as mail server, it’s highly recommended to have a good…

Let’s watch a youtube video first:  Clickjacking As we see that, After playing a simple game, the player’s webcam got clickjacked. Here is another video from Google video, New Zero-Day Browser Exploits -ClickJacking, which will show you a detailed descrtion about…

Why I need to make sure to implement P3P if using iframes or using cross-site cookies? The point is that if your application is inside iframe with parent belongs to another domain – cookies will not work for some very…

If you require more controls on file permissions, ACL (a.k.a Access Control Lists) might be a nice choice. ACL goes beyond normal user-group based permission control and allow setting permissions on per individual user or group basis.

I just tried the famous shell fork() bomb on my Laptop, which is running Debian lenny. (I dare to do this because I’m going to shut down my laptop.) Please note that do NOT run it on your production server!