Let's say we are looking to determine if our system is vulnerable to Heartbleed or LogJam. # ls /usr/lib64/libssl.so.* /usr/lib64/libssl.so.10 /usr/lib64/libssl.so.1.0.1e # yum info openssl Installed Packages Name : openssl Arch : x86_64 Epoch : 1 Version : 1.0.1e Release : 42.el7_1.9 Size : 1.5 M Repo : installed From repo : rhel-7-server-rpms Summary : Utilities … Continue reading How to determine if your Red Hat Enterprise Linux 7 system is vulnerable to a specific CVE
Category: linux
Yum Command Cheat Sheet for Red Hat Enterprise Linux
Great reference to keep at the desk! https://access.redhat.com/articles/yum-cheat-sheet
Need a quick proxy via SSH?
Need access to a web site, tucked behind a firewall? Do you already have a public SSH server set up to allow access, but not sure how to tunnel your HTTP session? It's easy! ssh -N -D 127.0.0.1:8000 <user>@<ssh server fqdn> That command sets up a SOCKS4/SOCKS5 proxy. Just configure your Browser/OS settings to use … Continue reading Need a quick proxy via SSH?
July 1 2012 Linux problems? High CPU/Load? Probably caused by the Leap Second!
(Update posted, see below) As posted in multiple places around the web: Debian /etc/init.d/ntp stop date `date +"%m%d%H%M%C%y.%S"` Red Hat /etc/init.d/ntpd stop date `date +"%m%d%H%M%C%y.%S"` Update: This first manifested itself for us in our Java stacks -- all of our (dual processor) Tomcat servers were running at a load of 30-40. However, this is a … Continue reading July 1 2012 Linux problems? High CPU/Load? Probably caused by the Leap Second!