Find Out Which Process Is Listening Upon a Port

How do I find out running processes were associated with each open port? You will get an output similar to this one The process i, which is 6782, now this is the process that is using port 8080. Kill the process, type: kill 6782 and now port 8080 is free. http://www.cyberciti.biz/faq/what-process-has-open-linux-port/

Tips for Windows Server 2003 Compromise

If your server is sending spam or compromised, here are a few tip. First thing is to do a password audit, you can view these passwords in plain text in this file: C:Program FilesParallelsPleskMail ServersMail EnableConfigAUTH.TAB If some passwords in use are very weak they will eventually become compromised. Pay extra attention to common business … Read more

ERROR:- OpenSSL ‘ChangeCipherSpec’ MiTM Vulnerability

From a PCI scan, this error. Answer: Your scanning provider is apparently relying on the version information in the banner to determine vulnerability. Redhat frequently backports fixes into previous versions of applications which is the case with your version of OpenSSL (openssl-0.9.8e-27.el5_10.4). This is a false positive. The vulnerability does not affect this server. You … Read more

How to Secure SSH with Google Authenticator’s Two-Factor Authentication

Source: http://www.howtogeek.com/121650/how-to-secure-ssh-with-google-authenticators-two-factor-authentication/ Also, for CentOS: http://www.tecmint.com/ssh-two-factor-authentication/ Want to secure your SSH server with easy-to-use two-factor authentication? Google provides the necessary software to integrate Google Authenticator’s time-based one-time password (TOTP) system with your SSH server. You’ll have to enter the code from your phone when you connect.

Security Settings in Windows 2012 not allowing DirectX download

Problem: Our security settings are stopping me from downloading DirectX. Disable IE Enhanced Security on Windows Server 2012 Description This article will detail disabling the ‘IE Enhanced Security Configuration’ setting within Windows Server 2012. Enchanced Security mode limits the exposure of the server to potentially malicious Web content. However, as a result, this option can … Read more

Adding Additional IP Addresses CentOS

ssh to the server If the main adapter is called “eth0” you have to call the next (virtual) adapter in a sequential order like so: ifcfg-eth0 (primary adapter, physical) ifcfg-eth0:1 (first virtual adapter to the physical primary adapter) ifcfg-eth0:2 (second virtual adapter to the physical primary adapter) Copy our primary adapter configuration file and name … Read more

AB Tool for Benchmark

http://httpd.apache.org/docs/2.2/programs/ab.html http://www.cyberciti.biz/tips/howto-performance-benchmarks-a-web-server.html -n 10000: ab will send 1000 number of requests to server 202.54.200.1 in order to perform for the benchmarking session -c 50 : 50 is concurrency number i.e. ab will send 50 number of multiple requests to perform at a time to server 202.54.200.1 Login to Linux/bsd desktop computer and type following command: … Read more