Category Archives: Ubuntu

HospitalRun – Docker Containerized

Hi Guys, i just ran the containerized version of the HospitalRun Application on my digitalocean droplet using my own self signed certificate. Please Watch my Youtube Video:- apt-get install \ apt-transport-https \ ca-certificates \ curl \ gnupg-agent \ software-properties-common curl -fsSL | sudo apt-key add – apt-key fingerprint 0EBFCD88 add-apt-repository \ “deb [arch=amd64] \ $(lsb_release -cs) \ stable”

Read more

Process Management in Linux

Process Types Before we start talking about Linux process management, we should review process types. There are four common types of processes: Parent process Child process Orphan Process Daemon Process Zombie Process Parent process is a process which runs the fork() system call. All processes except process 0 have one parent process. Child process is created by a parent process.

Read more

How To Patch and Protect Linux Kernel Stack Clash Vulnerability CVE-2017-1000364 [ 19/June/2017 ]

Avery serious security problem has been found in the Linux kernel called “The Stack Clash.” It can be exploited by attackers to corrupt memory and execute arbitrary code. An attacker could leverage this with another vulnerability to execute arbitrary code and gain administrative/root account privileges. How do I fix this problem on Linux? The Qualys Research Labs discovered various problems

Read more

Cpustat – Monitors CPU Utilization by Running Processes in Linux

Cpustat is a powerful system performance measure program for Linux, written using Go programming language. It attempts to reveal CPU utilization and saturation in an effective way, using The Utilization Saturation and Errors (USE) Method (a methodology for analyzing the performance of any system). It extracts higher frequency samples of every process being executed on the system and then summarizes

Read more

Linux security alert: Bug in sudo’s get_process_ttyname() [ CVE-2017-1000367 ]

Skip to contCa There is a serious vulnerability in sudo command that grants root access to anyone with a shell account. It works on SELinux enabled systems such as CentOS/RHEL and others too. A local user with privileges to execute commands via sudo could use this flaw to escalate their privileges to root. Patch your system as soon as possible.It

Read more
« Older Entries