SysLog
SYSLOG (System Log) è un protocollo appartenente alla Suite di protocolli Internet utilizzato per trasmettere attraverso una rete semplici informazioni di log. Funzionamento Il protocollo SYSLOG a...
View ArticleLinux : Unable to connect to CUPS server localhost:631 – Connection refused
Errore riscontrato nei log di sistema : Jun 12 13:45:29 SERVER smbd[25324]: [2012/06/12 13:45:29, 0] printing/print_cups.c:cups_connect(69) Jun 12 13:45:29 SERVER smbd[25324]: Unable to connect to CUPS...
View ArticleFreeBSD : installazione strigi , errore ‘sleep’ was not declared in this scope
Durante l'installazione o l'aggiornamento del pacchetto strigi (richiesto per l'installazione di alcuni ports kde) potreste riscontrare il seguente errore (o simile) :...
View ArticleBash : Daemon script
#!/bin/bash function sanityCheck { q=`ps -ef |grep $0 |grep -v "grep"|grep -v $$| wc -l` if [ $q != "0" ]; then echo "Another instance of $0 running..." exit 1 fi } function start { sanityCheck echo...
View ArticleMysql : Soluzione errore “Another MySQL daemon already running with the same...
Se all'avvio del servizio mysql server si ottiene il seguente errore ... Another MySQL daemon already running with the same unix socket ... eseguire i seguenti comandi: mondounix.com # mv...
View ArticleGnome Keyring Daemon Credential Disclosure
The gnome-keyring-daemon is vulnerable to local credential disclosure as it leaves credentials accessible in memory. Source: Gnome Keyring Daemon Credential Disclosure The post Gnome Keyring Daemon...
View ArticleAPC UPS Daemon 3.14.14 Privilege Escalation
APC UPS Daemon versions 3.14.14 and below suffer from a privilege escalation vulnerability. Source: APC UPS Daemon 3.14.14 Privilege Escalation The post APC UPS Daemon 3.14.14 Privilege Escalation...
View ArticleTinc Virtual Private Network Daemon 1.0.32
tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share...
View ArticleDocker Daemon Unprotected TCP Socket
Utilizing Docker via unprotected tcp socket (2375/tcp, maybe 2376/tcp with tls but without tls-auth), an attacker can create a Docker container with the ‘/’ path mounted with read/write permissions on...
View ArticleTinc Virtual Private Network Daemon 1.0.33
tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share...
View Article