Maltrail – Malicious Traffic Detection System
avatar

A malicious traffic detection system which can be deployed on your network with ease.

https://www.latesthackingnews.com/maltrail-malicious-traffic-detection-system/

Posted in Linux, Networking | Tagged | Leave a comment

Run / Execute Command Using SSH
avatar

Source: Run / Execute Command Using SSH

Posted in News | Leave a comment

Linux: Keep An Eye On Your System With Glances Monitor
avatar

 

 

This is a simple to install script which will make monitoring you system in real-time very easy.

 

Source: Linux: Keep An Eye On Your System With Glances Monitor

Posted in Linux | Leave a comment

Populate a Binary Database Field Using a Local File
avatar

You can run the following SQL statement to populate a binary database field using a local file.

UPDATE <table>
SET <field> = (SELECT BulkColumn from Openrowset( Bulk ‘<full file path accessible by the server>’, Single_Blob) as <field name>)
WHERE <where condition>

Posted in Development | Tagged , | Leave a comment

Bug in OpenSSH Opens Linux Machines to Password Cracking Attack
avatar

Critical vulnerability in OpenSSH Opens Linux Machines to Password Cracking Attack

Source: Bug in OpenSSH Opens Linux Machines to Password Cracking Attack

Posted in Hacks | Leave a comment