Month: September 2014

  • How to protect your CentOS server from the Shellshock exploit

    How to protect your CentOS server from the Shellshock exploit

    Shellshock is quite a serious security hole found a couple of days ago in Bash; to check whether your CentOS server is vulnerable run the following in a terminal: env VAR='() { :;}; echo Shellshock vulnerable!’ bash -c “echo Bash Testing” If your system is vulnerable, you will see: Shellshock vulnerable! Bash testing If it…

  • How to protect Debian from the Shellshock exploit

    Shellshock is quite a serious security hole found a couple of days ago in Bash; to check whether your Debian server is vulnerable run the following in a terminal: env VAR='() { :;}; echo Shellshock vulnerable!‘ bash -c “echo Bash Testing” If your system is vulnerable, you will see: Shellshock vulnerable! Bash testing If it…

  • How to protect Ubuntu against the Shellshock exploit

    How to protect Ubuntu against the Shellshock exploit

    Shellshock is quite a serious security hole found a couple of days ago in Bash; to check whether your Ubuntu server is vulnerable run the following in a terminal:   env VAR='() { :;}; echo Shellshock vulnerable!‘ bash -c “echo Bash Testing”   If your system is vulnerable, you will see:   Shellshock vulnerable! Bash…

  • Debian: How to see what has recently been upgraded or updated through apt-get

    Forgotten what it was you last updated, or want to check what someone else has been updating? There’s a log file for that, and it’s located at:   /var/log/apt/history.log   To view it, run:   less /var/log/apt/history.log   Looking for an older logfile? They’re kept, too. To see the other log files available, view the…