background preloader

Recover MySQL root Password

Recover MySQL root Password
You can recover MySQL database server password with following five easy steps. Step # 1: Stop the MySQL server process. Step # 2: Start the MySQL (mysqld) server/daemon process with the --skip-grant-tables option so that it will not prompt for password. Step # 3: Connect to mysql server as the root user. Step # 4: Setup new mysql root account password i.e. reset mysql password. Step # 5: Exit and restart the MySQL server. Here are commands you need to type for each step (login as the root user): Step # 1 : Stop mysql service # /etc/init.d/mysql stop Output: Stopping MySQL database server: mysqld. Step # 2: Start to MySQL server w/o password: # mysqld_safe --skip-grant-tables & Output: [1] 5988 Starting mysqld daemon with databases from /var/lib/mysql mysqld_safe[6025]: started Step # 3: Connect to mysql server using mysql client: # mysql -u root Output: Welcome to the MySQL monitor. Step # 4: Setup new MySQL root user password Step # 5: Stop MySQL Server: Step # 6: Start MySQL server and test it

Configure apt-get with proxy [Archive] Ubuntu Forums > The Ubuntu Forum Community > Forum Archive > Main Support Categories > General Help > Configure apt-get with proxy Hello, Does anyone know: - How do I configure apt-get to work with a proxy? - How do I configure kynaptic (not synaptic) to work with a proxy? Put the following into your /etc/bash.bashrc file (after putting in the proper servername/IP and port number). Put the following into your /home/username/.bashrc file (after putting in the proper servername/IP and port number). export http_proxy= export ftp_proxy= I know that'll work if you add the lines, open a new Konsole prompt, and then launch Kynaptic from there. And tried all combinations (only to .bashrc, only to bootmisc.sh, both) with no luck :-| I know that will work for apt-get from the command line because I helped a guy ( Hi, It seems that I have a similar problem..

ubuntu set system proxy from command line La Zona Linux - Cómo hacer un Backup completo de tu sistema Linu Oracle estaría intentando destruir el Open Source 20 de agosto 2010.- Recordará el lector que cuando Oracle y Sun anunciaron el acuerdo para que la primera absorbiera a la segunda, los grandes defensores del Open Sourse y el software libre (incluyendo la Free Software Foundation, Richard Stallman y el fundador de MySQL ) se mostraron opuestos al acuerdo, argumentando que Oracle, famoso por su base de datos, tenía una enorme motivación para bajarle la cortina a MySQL, adquirido por Sun un año antes. Oracle tranquilizó a todo el mundo sosteniendo que en realidad estaba interesado en el hardware de Sun y que no tocaría los proyectos Open Source, logrando convencer al DOJ de Estados Unidos y a la Unión Europea. La teoría la plantea Dana Blankenhorn de ZDNet y, aunque soy reacio a prender con las ideas de conspiraciones, hay que reconocer que tiene bastante sentido. Básicamente, Oracle puede permitirse destruir lo que ha comprado.

Cómo encriptar una memoria USB Artículo de Usemos Linux Cómo encriptar una memoria USB Navegando en Internet pude descubrir este sencillo tuto en el que el usuario amzertech explica cómo hacerlo. Para aquellos que prefieran seguir el instructivo en forma escrita y en español, aquí va. Pasos a seguir 1. sudo apt-get install cryptsetup 2. 3. 4. 5. 6. Para crear la partición encriptada, hacé clic en el botón Crear partición. Esperá un ratito hasta que termine de hacer el trabajo sucio. Una vez que terminó, creá la segunda partición: la que NO va a estar encriptada y que vas a usar para llevar y traer información. Sentate, tomate un mate y esperá. 7. Ahora, cada vez que montes la partición encriptada, vas a ver que ésta aparece con un candadito abierto, indicando que ingresaste la contraseña correcta y que está accediendo a una unidad encriptada. Nota: no sé si es un “bug” o qué, pero NUNCA Expulses en forma segura alguna de las particiones. 8.

IptablesHowTo Basic iptables howto Iptables is a firewall, installed by default on all official Ubuntu distributions (Ubuntu, Kubuntu, Xubuntu). When you install Ubuntu, iptables is there, but it allows all traffic by default. Ubuntu 8.04 Comes with ufw - a program for managing the iptables firewall easily. There is a wealth of information available about iptables, but much of it is fairly complex, and if you want to do a few basic things, this How To is for you. Basic Commands Typing sudo iptables -L lists your current rules in iptables. Chain INPUT (policy ACCEPT) target prot opt source destination Chain FORWARD (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination Basic Iptables Options Here are explanations for some of the iptables options you will see in this tutorial. -A - Append this rule to a rule chain. Allowing Established Sessions We can allow established sessions to receive traffic: Allowing Incoming Traffic on Specific Ports Logging #! #!

Intrustion detection and prevention for Apache with mod-security Posted by Steve on Tue 28 Dec 2004 at 19:35 mod-security is a simple intrusion detector and preventor for Apache, allowing you to wrap an additional layer of protection around your webserver. mod-security is a rule-based IDS (intrusion protection system) which allows you to create rules describing abnormal requests to your webserver. When malicious requests are made which match your rules the request can be denied, and the details logged. With the rise of recent PHP-based worms, (such as Santy.E, or the renamed version PhpIncludeWorm ), which attempt to exploit any PHP script they find it's suddenly much more important to protect your server. The real protection, of course, is to only install and use secure code but if you're not auditing the code yourself, and the author was careless you could suddenly find yourself attacked with no warning. Installing mod-security on Woody Installing mod-security on an Unstable machine Configuring It Testing It Links

Related: