Why is RAID So Important for Databases? OpenVMS. Secure Erase your SSD. The SSD drives have already hit the market and their arena is shaping up to be fierce with a lot of players. For those who have never heard of the SSD technology, here is a brief explanation: The SSD (Solid State Drive) is another storage unit for your computer, similar to your hard drive – but zillions times faster! Yes sir, not mechanical components here, so if you look under the hood of your SSD, you won’t find any magnetic head & platters, but just a plain PCB board. This means huge read/write transfer rate for your data (eg OCZ Revodrive3 X2 operates at ~900mb/s, while a typical WD Green at 110mb/s max). Before you crack a big smile, let me remind you what Ben Parker said to Peter: “With Great Power comes Great Responsibility”. In other words, this hell-of-a-speed data flow comes with a price – its limited lifespan. Okay, suppose you have Slackware or whatever Linux distro you like.
The more you read and write from/into your SSD, the more you lose from its performance. Not enabled. Cyber Attacks Explained: Packet Crafting. Protect your FOSS-based IT infrastructure from packet crafting by learning more about it.
In the previous articles in this series, we explored common infrastructure vulnerability exploitation scenarios. This article takes a step forward to describe a technically advanced attack that could badly impact networks because it is tough to detect. Packet crafting is a commonly used and yet complex method to exploit vulnerabilities and, hence, it is important for network administrators to know more about it, and also to understand the various ways to protect their infrastructure against it. We will also look at how to protect FOSS-based systems from a packet crafting attack. What is packet crafting? Crafting, by definition, means to make or create something skillfully.
How do I change the root directory of a command? How do I change the root directory of a process such as web-server using a chroot command to isolate file system? How do I use a chroot to recover password or fix the damaged Linux/Unix based environment? Each process/command on Linux and Unix-like system has current working directory called root directory of a process/command.
You can change the root directory of a command using chroot command, which ends up changing the root directory for both current running process and its children. A process/command that is run in such a modified environment cannot access files outside the root directory. Purpose The chroot command changes its current and root directories to the provided directory and then run command, if supplied, or an interactive copy of the user's login shell. Syntax The basic syntax is as follows: