Archive for the tag 'security'

 

 

Feb 28 2021

Change Procedure/Function Security Type and DEFINER

Published by under Mysql

Mysql procedures and functions security type is set as DEFINER which is the default value, as described in the “Create Procedure and create function chapter” on mysql.com.Why one needs to be cautious? Anyone with EXECUTE privilege can run the procedure or function with the DEFINER permissions. This might not be what you want. An error […]

No responses yet

May 29 2017

Determine Operating System within FTP Session

Published by under AS400,Linux,Networking

The “QUOTE” keyword is essential to allow a user to run system-specific commands on FTP servers (SITE or ALLO for example). These commands do not have to be understood by FTP clients. Most FTP clients send a NOOP – that actually is a dummy packet – to keep the connection up  QUOTE SYST returns the Operating […]

No responses yet

Apr 22 2017

Managed Service Account Fails after Reboot

Published by under Windows

Windows services can be started with a Managed Service Account (MSA) for the sake of security and easy management. It is working just fine until I initiate a server reboot. The service would not start. Opening the service and wiping out the password field makes the service start again, until the next boot. What could […]

No responses yet

Apr 06 2017

Configure Windows Managed Service Accounts

Published by under Windows

Windows Managed service accounts (MSA) appeared in Windows 2008 R2 Server. MSA provide dedicated accounts for each service without the hassle of managing password assignment or reset. Less management, more security.However, a single account cannot be used across multiple servers. This could lead to many service accounts within a domain but this is not a […]

No responses yet

Aug 09 2009

How to crack a WEP key and decrypt live traffic

Published by under Linux,Security

Cracking a WEP key is extremely easy and is a matter of a few seconds. Truth? Pretty much… We are going to decrypt traffic in real time as well without even needing to connect to the wireless access point. All steps will be run under root super-user as interfaces state needs to be changed.  Aircrack Installation […]

One response so far

Next »