Drown Attack

Check your Site at https://drownattack.com/#test or run the following: http (replace IP with your server ip) postfix or other email MTA Check your version To protect against DROWN, server operators need to ensure that their private keys are not used anywhere with server software that allows SSLv2 connections. This includes web servers, SMTP servers, IMAP … Read more

Left Join on mysql

SQL LEFT JOIN Syntax or: PS! In some databases LEFT JOIN is called LEFT OUTER JOIN. Example: You have a surveys table and a services table and the id’s are both client_id

What is the use of /etc/udev/rules.d/70-persistent-net.rules file in Rhel/Centos?

what is the use of /etc/udev/rules.d/70-persistent-net.rules file in linux? is anyother way to change interface name in linux other than 70-persistent-net.rules? This file associates your NIC’s MAC address with an interface name that will be given to the NIC at startup. There are certainly ways to change the name at runtime but if you reboot, … Read more