Explore information related to github

OpenLDAP and phpLDAPadmin on Linux

This article will guide you on how to install #OpenLDAP and phpLDAPadmin on #Ubuntu. Also, we covered the prospective error affacting OpenLDAP and phpLDAPadmin and its solution as well.

#LDAP (Lightweight Directory Access Protocol) is an open and cross platform protocol used for directory services authentication. LDAP provides the communication language that applications use to communicate with other directory services servers.

#Kerberos is used to manage credentials securely (authentication) while LDAP is used for holding authoritative information about the accounts, such as what they're allowed to access (authorization), the user's full name and uid.

To access #phpLDAPadmin:

Point your browser to http://IP_OF_SERVER/phpldapadmin (IP_OF_SERVER is the actual IP address of your LDAP server). 

From the main window, click the login button in the left pane. 

When prompted, you will log into your DN and enter the password for the admin user created during the slapd reconfiguration.

Read More



Memcached DDOS attack

This article will guide you on methods to mitigate Memcached DDOS attacks which occur mostly by accident. To mitigate this attack, you can Disable #UDP, #Firewall #Memcached servers, and so on.

 DoS attack is a denial of service attack where a computer is used to flood a server with TCP and UDP packets. A DDoS attack is where multiple systems target a single system with a DoS attack. The targeted network is then bombarded with packets from multiple locations.

DDoS attacks are illegal under the Computer Fraud and Abuse Act. Starting a DDoS attack against a network without permission is going to cost you up to 10 years in prison and up to a $500,000 fine.

There are three essential security measures that all small businesses should take to protect themselves from #DDoS #attacks: Use a web application firewall (#WAF): The absolute best way to prevent a DDoS attack is through the use of a WAF that blocks bad traffic and prevents DDoS attacks from accessing your web server.

A Denial-of-Service (#DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash.

Different DDoS attack method:

1. UDP flood.

2. ICMP (Ping) flood.

3. SYN flood.

4. Ping of Death.

5. Slowloris.

6. NTP Amplification.

7. HTTP flood.

Read More



Monitor System Metrics with the TICK Stack on CentOS 7

This article will guide you on how the TICK stack can be a powerful tool for storing, analyzing, and visualizing time series data. To monitor InfluxDB _internal metrics in a production #cluster, use Telegraf and the influxdb input plugin to capture these metrics from the InfluxDB /debug/vars endpoint and store them in an external InfluxDB monitoring instance.

More about Kapacitor:

#Kapacitor is a native data processing engine for #InfluxDB 1. x and is an integrated component in the InfluxDB 2.0 platform. 

Kapacitor can process both stream and batch data from InfluxDB, acting on this data in real-time via its programming language TICKscript.

A retention policy (RP) is the part of InfluxDB data structure that describes for how long InfluxDB keeps data. 

InfluxDB compares your local server's timestamp to the timestamps on your data and deletes data that are older than the RP's DURATION . 

A single database can have several RPs and RPs are unique per database.

Read More



DNS Amplification Attack

This article will guide you on different methods to mitigate DNS amplification attack. Basically, DDoS attacks can really freeze websites or even cause server downtime. 

DNS flood is a type of Distributed Denial of Service (#DDoS) attack in which the attacker targets one or more Domain Name System (DNS) servers belonging to a given zone, attempting to hamper resolution of resource records of that zone and its sub-zones.

A Domain Name Server (#DNS) Amplification attack is a popular form of Distributed Denial of Service (DDoS), in which attackers use publically accessible open DNS servers to flood a target system with DNS response traffic.

1. UDP reflection attacks exploit the fact that UDP is a stateless protocol.

2. An attacker then sends the UDP packet containing the spoofed source IP to an intermediate server. 

3. The server is tricked into sending its UDP response packets to the targeted victim IP rather than back to the attacker's IP address.

Read More



Install WordPress with Docker Compose

This article will guide you on how to install WordPress with docker compose.

Docker Hub is an official repository where individuals and organizations can upload Docker images for public consumption.

The reason for using Docker is used to define and start running multi-container Docker applications. You need to define docker-compose. yml for the services that make up your app services. You should run docker-compose up and Compose starts and runs your entire app.

Steps to #Install WordPress with Docker on #Ubuntu 20.04 :

1. Create a Cloud Server. First, log in to yourCloud Server.

2. Install Required #Dependencies.

3. Install Docker.

4. Create a MariaDB #Container.

5. Create a #WordPress Container.

6. Configure #Nginx as a Reverse Proxy.

7. Access WordPress Interface.


To Update WordPress

The docker-compose.yml specifies the latest version of the WordPress image, so it's easy to update your WordPress version:

docker-compose down

docker-compose pull && docker-compose up -d

Read More



WordPress Brute Force Attack

This article will guide you on Brute Force Attack and different ways to troubleshoot and fix a Brute-Force Attack in #WordPress.

Brute-force attacks work by calculating every possible combination that could make up a password and testing it to see if it is the correct password. 

As the password's length increases, the amount of time, the computational power required on average, to find the correct password increases exponentially.

#Brute #Force #Attack Prevention Techniques:

1. Limit failed login attempts.

2. Make the root user inaccessible via #SSH by editing the sshd_config file.

3. Don't use a default port, edit the port line in your sshd_configfile.

4. Use Captcha.

5. Limit logins to a specified IP address or range.

6. Two factor authentication.

7. Unique login URLs.

Read More



How to install OBS on Linux Windows and MacOS

This article will guide you on steps to #install #OBS on #Windows. Also, we saw some common errors that we came across while installing OBS.

Open Broadcaster Software (OBS) is a free and open-source cross-platform streaming and recording program built with Qt and maintained by the OBS Project. There are versions of OBS Studio available for Microsoft Windows, macOS, and Linux distributions. OBS is funded on Open Collective.

As a standard Windows application, OBS should run fine on Windows 10 without any issues in the core program. However, OBS makes heavy use of advanced hardware features, particularly on your GPU such as texture sharing and hardware encoding. Windows 10 will come with new #drivers for your hardware, including your #GPU.

To set up OBS for #streaming:

1. Run the auto-configuration wizard. When you load OBS Studio for the first time you should see the Auto-Configuration Wizard.

2. Set up your audio devices. By default, OBS Studio is set to capture your system default desktop audio device and microphone.

3. Add your sources for video.

4. Test your stream and record settings.

Read More



Wget SSL error How to fix it

This article will guide you on steps to fix #Wget #SSL error which is a generic #error that pops an error message "Unable to establish SSL connection" .
To support encrypted HTTP ( #HTTPS ) downloads, Wget must be compiled with an external SSL library, currently #OpenSSL. If Wget is compiled without SSL support, none of these options are available."
You might need to check whether the version of wget you are using supports #SSL.

Read More



Cant locate LWP UserAgent pm in @INC

This article will guide you on how to get rid of error "Can't locate LWP/UserAgent.pm in @INC" which occurs in the process of installing #applications like CSF in the DirectAdmin server or any other #Linux #distros. 

libwww-perl (also known as LWP) is a collection of #Perl #modules that provide a simple and consistent programming interface (API) to the World-Wide Web.

In order to install and use this #package you will need Perl version

5.8.1 or better:

Some modules within this package depend on other packages that are distributed separately from Perl.  We recommend that you have the following #packages installed before you install

libwww-perl:

i. Digest-MD5

ii. Encode-Locale

iii. HTML-Form

iv. HTML-Parser

v. HTML-Tagset

vi. HTTP-Cookies

vii. HTTP-Date

viii. HTTP-Message

ix. HTTP-Negotiate

x. libnet

xi. LWP-MediaTypes

xii. MIME-Base64

xiii. Net-HTTP

xiv. URI

xv. WWW-RobotRules


If you want to access sites using the https protocol, then you need to

install the LWP::Protocol::https module from CPAN.

Read More



Set Up Laravel Nginx and MySQL with Docker Compose

This article will guide you on how to set up #Laravel, #Nginx, and #MySQL with #Docker Compose. When using a #LEMP application stack, for example, with PHP, Nginx, MySQL and the Laravel framework, Docker can significantly streamline the setup process.
Docker Compose has further simplified the development process by allowing developers to define their #infrastructure, including application services, #networks, and volumes, in a single file. Docker Compose offers an efficient alternative to running multiple docker container create and docker container run #commands.

Read More



JupyterLab Environment on Ubuntu 18 04

This article will guide you on the process to set up a JupyterLab Environment on Ubuntu and made it accessible remotely. 

The JupyterLab Credential Store uses a password that you set upon first use. Each credential is encrypted with a hash of your password. The encrypted credentials are stored in the credentialstore file in the #directory you start #JupyterLab from.

You can also create new #environments from within Jupyter Notebook (home screen, Conda tab, and then click the plus sign). And you can create a notebook in any environment you want. Select the "Files" tab on the home screen and click the "New" dropdown menu, and in that menu select a Python environment from the list.

Read More



QUIC flood DDoS attack

This article will guide you on how to prevent your #Servers from #QUIC #DDOS #Attacks which is capable of overwhelming a targeted server with unwanted #UDP packets. QUIC uses UDP, but a QUIC flood is not necessarily the same as a UDP flood.

Read More



Implementing Post and Get data with Native HTTP Plugin

This article will guide you on the steps to implement post and get data with the Native HTTP plugin.

Read More



Facts about Apache Thrift

Thrift can be set up to use HTTP and JSON pretty easily if you want it (say if your client is somewhere on the internet and needs to pass firewalls) Thrift supports persistent connections and avoids the continuous TCP and HTTP handshakes that HTTP incurs.

Read More



Add Barcode Scanner QR Scanner using Native Plugin In Ionic Capacitor APP

This article will guide you on the steps to take to integrate a Barcode scanner and QR Code scanner phonegap-plugin-barcodescanner in Ionic Capacitor apps.

Read More