智能运维
-
What Is 5D Optical Data Storage Alias 'Superman Memory Crystal'?
Storage is a sector that holds tressure (data) in the digital world. Demand for storage keeps increasing with the digitalization of the globe. From individuals, small to big size organizations, gover…
-
How Can You Protect Your Computer From Infected 'COA' and 'rc' NPM Packages?
Recently, the globe has witnessed another supply chain attack. This time attackers cleverly infected two popular NPM packages: COA and rc, with password-stealing malware to create a backdoor on the v…
-
How To Fix CVE-2021-22931- Missing Input Validation In Domain Names In Node.js
Researchers disclosed three vulnerabilities in multiple versions of Node.js. Two of the vulnerabilities are high in severity and one is low among the three. The first and the prominent High severity …
-
CISA Published A Catalog Of Known Exploited Vulnerabilities
Cybersecurity and Infrastructure Security Agency (CISA) has issued Binding Operational Directive (BOD) 22-01 to remediate vulnerabilities that are actively being exploited by known adversaries. To su…
-
How To Fix CVE-2021-43267- A Heap Overflow Vulnerability In Linux Kernel's TIPC Module
Security researchers from SentinelLabs has discovered a new heap overflow vulnerability in the Linux Kernel’s Transparent Inter Process Communication (TIPC) module. The vulnerability being trac…
-
Learn Terminal
Now Graphical User Interface (GUI) has become an integral part of today’s operating system. This is the interface we mostly interact with to operate computers. Before there was GUIS, there were…
-
How To Fix CVE-2021-22205, Unauthenticated RCE Vulnerability In GitLab
On Nov 1, Rapid7 published a detailed report about the exploitation of a patched vulnerability in GitLab. Let’s see how to fix CVE-2021-22205, an unauthenticated (RCE) remote code execution vul…
-
Introduction To Ubuntu
Today, if you sit to make a list of operating systems and it’s types, variants, versions, and distributions, you never make a comprehensive list. Because there are thousands of operating system…
-
Fix Critical Vulnerabilities Found In Pentaho Business Analytics Software
Researchers disclosed Six critical vulnerabilities on Pentaho Business Analytics software whose CVSS score has been calculated from 2.7 to 9.9. According to the report, threat actors can leverage the…
-
Step-By-Step Procedure To Install Red Hat Enterprise Linux On VMWare Workstation
Red Hat is one of the most powerful commercial server Linux distributions available for physical, cloud, and virtual platforms. We have created this post to introduce you to Red Hat Enterprise Linux …