Boot your Linux server from rescue disk.
At boot: prompt, press F5 then type command linux rescue.
Find superblock locations for /dev/sda3:
# dumpe2fs /dev/sda3 | grep superblock
InetServices offers both Windows and Linux bare metal server hosting, and cloud server hosting for any small to medium size business. We also offer both PCI and HIPAA Compliant servers allowing you to achieve PCI or HIPAA Compliance without all the worries of figuring it out. InetServices offers much more than just dedicated servers and cloud servers, we offer you a complete solution to your hosting needs including Big Data, Disaster Recovery, and High Availability services.
Boot your Linux server from rescue disk.
At boot: prompt, press F5 then type command linux rescue.
Find superblock locations for /dev/sda3:
# dumpe2fs /dev/sda3 | grep superblock
Vulnerability Issue:
A flaw was found in the way BIND handled requests for TKEY DNS resource records. A remote attacker could use this flaw to make named (functioning as an authoritative DNS server or a DNS resolver) exit unexpectedly with an assertion failure via a specially crafted DNS request packet.
Follow these steps to boot in Single User mode in Ubuntu 12.04:
Step 1: Reboot the server and press “shift” key continuously to get the grub loader screen.
Step 2: In the Grub2 menu, select the first line with Linux x.x.x.x-generic.
On January 27, 2015, the GHOST vulnerability was announced by Qualys. This vulnerability allows remote attackers to take complete control of a system by exploiting a buffer overflow bug in a glibc function GetHOST. This vulnerability should be considered serious and all affected servers should be patched immediately.
To generate your CSR, you will need to log in to your server and use the OpenSSL software to generate a CSR and private key.
openssl req -nodes -newkey rsa:2048 -sha1 -keyout myserver.key -out server.csr
SSH keys allow authentication between two hosts without the need of a password. SSH key authentication uses two keys, a private key and a public key.
To generate the keys, from a terminal prompt enter:
OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on. Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection
To see your current rules in iptables (IPv4), enter:
$ sudo iptables -L
To see your current rules in ip6tables (IPv6), enter:
ufw command – This command is used for managing a Linux firewall and aims to provide an easy to use interface for the user.
Login as root.