uuidgen
tune2fs /dev/sde5 -U new_uuid
swaplabel
uuidgen
tune2fs /dev/sde5 -U new_uuid
swaplabel
Modify a queued message # exim -Mar 1G4K8N-0003uY-29 [email protected] # Add recipient
# exim -Mes 1G4K8N-0003uY-29 [email protected] # Edit sender
# exim -Mmad 1G4K8N-0003uY-29 # Mark all delivered
# exim -Mmd 1G4K8N-0003uY-29 [email protected] # Mark delivered (just the address)
su – some_user -c “ls -la ~/”
netstat -an|awk ‘/tcp/ {print $6}’|sort|uniq -c
lsof | grep -e “[[:digit:]]\+w”
date +%T -s “07:13:13”
tr -s [:space:] \\n < test.txt | sort | uniq -c | cut -c7-
Inode number
Access Control List (ACL)
Extended attribute
Direct/indirect disk blocks
Number of blocks
File access, change and modification time
File deletion time
File generation number
File size
File type
Group
Number of links
Owner
Permissions
Status flags
Or if shortly:
Size of file
Device ID
User ID of the file
Group ID of the file
The file mode information and access privileges for owner, group and others
File protection flags
The timestamps for file creation, modification etc
link counter to determine the number of hard links
Pointers to the blocks storing file’s contents
Libsafe is a system library that intercepts calls to specific unsafe functions and handles them securely. This allows it to handle precompiled executables, meaning that manually editing the source and recompiling (or waiting for the maintainer to do this) is not necessary. Also, and possibly more important, it will work on bugs in software programs that have not been discovered yet. It can do this because it intercepts all calls to a particular function, performs the task, and sends back the information without the calling program’s knowledge.
Even if a program has been written using bad techniques, Libsafe will stop it from possibly being exploited. It will do this systemwide and will be transparent to the programs themselves. The main idea is to set an upper limit on the size of the buffer that is used in a particular function. Although this can’t be done at compilation time, it can be done when the function is actually called. Libsafe checks the current stack and sets a realistic limit so that the buffer can’t be overwritten.
Libsafe currently handles these unsafe functions:
strcpy(char *dest, const char *src)
strpcpy(char *dest, const char *src)
wcscpy(wchar_t *dest, const wchar_t *src)
wcpcpy(wchar_t *dest, const wchar_t *src)
strcat(char *dest, const char *src)
wcscat(wchar_t *dest, const wchar_t *src)
getwd(char *buf)
gets(char *s)
scanf(const char *format, …)
realpath(char *path, char resolved_path[])
sprintf(char *str, const char *format, …)
vi /etc/munin/plugin-conf.d/munin-node
[exim_*]
group mail
wget https://github.com/kjellm/munin-mysql/archive/master.zip
yum install munin-node
yum install DBI DBD::mysql Module::Pluggable
vi Makefile
vi mysql.conf
make install
vi /etc/munin/plugin-conf.d/mysql_innodb
[mysql_innodb]
env.warning 0
env.critical 0
/etc/init.d/munin-node restart
su munin -c /usr/bin/munin-cron –shell=/bin/bash
ssh-keygen -y -f mykey.pem > mykey.pub
strace -e open $(ps -o lwp= -LC rsync | sed ‘s/^/-p/’)
lsof -ad3-999 -c rsync
vcl.load reload01 /etc/varnish/default.vcl
vcl.use reload01