Continuous Integration, Delivery, and Deployment: Delivering Continuous Excellence

Continuous Integration Continuous integration is a groundbreaking practice within the software development cycle where and which encourages the software developers to integrate and share their codes into the main branch of a shared repository as often as often. Instead of coding and testing out new features in an isolated environment and integrating them at the […]

DevOps: How does it work?

A Developer’s point of view A developer’s responsibility to his company is to offer new and exciting products to its clients while being faster in deployment and with better quality than his company’s competitors. A developer is someone who writes code for new programs, create new features, regular security updates and bug fixes to maintain […]

DevOps – The art of management

Software companies closing the gap between themselves by approaching their projects from a productive angle which does not compromise with its security and reliability. Moreover, every software developing companies are behaving similar as possible, this is to mimic the productivity of successful of enterprises. This added pressure leads to miscommunication, conflict of ideas, and lack […]

WannaCry Ransomware Attack

WannaCry Ransomware attack Ransomware is a new type of encryption-based malicious software attack that will locks up the system files in your computer and will encrypts in such a way that users cannot access files. The malware encrypts files using AES and RSA encryption ciphers which means hackers can decrypt files using unique decryption key. […]

Mysql Remote Root Code Execution

Remote Root Code Execution / Databse Privilege Escalation: Severity: Critical CVE-2016-6662 CVE-2016-6663 Privilege Escalation vulnerability is reported. Using this vulnerability, an attacker could execute code with root privileges. Using the REPAIR TABLE SQL statement, which have the lowest privileged users with SELECT/CREATE/INSERT grants, can create a simlink to the database directory( that is /var/lib/mysql). After […]

Dirty COW – Vulnerability Fix

Dirty COW [ CVE-2016-5195 ] COW -> Copy – On – Write Dirty COW is actually an old vulnerability , which has driven back after 10 long years. The issue was first identified by Linus Torvalds and found some difficulties to patch the issue. The vulnerability is also called privilege-escalation vulnerability. In which the normal […]

Wget CVE-2016-4971: Arbitrary File Upload

CVE-2016-4971 [Arbitrary File Upload / Potential Remote Code Execution] Severity: High below 1.8 version. All versions of Wget before the patched version of 1.18 are affected. 1. GNU wget before 1.18 when supplied with a malicious URL (to a malicious or compromised web server) can be tricked into saving an arbitrary remote file supplied by […]

Begin typing your search term above and press enter to search. Press ESC to cancel.

Enjoy this blog? Please spread the word :)

Follow by Email
Twitter
Visit Us
Follow Me
LinkedIn
Share
Instagram