Our Blog

Computer Security Vulnerability – Dirty COW (Dirty Copy-On-Write)

Posted by:

The vulnerability called “Dirty Cow” exploits a mechanism called copy-on-write. It allows an attacker to gain privilege escalation on the Linux Kernel. The bug has been lurking in the Linux Kernel since version 2.6.22 (released in Sept 2007) and has been actively exploited, at least since Oct 2016. It is a race condition found in Linux….

Continue Reading →
0

Using Chef Server and AWS Auto Scaling for Continuous Deployment

Posted by:

A big telecommunication organization wanted 24/7 Network Engineers to develop an application in which users could chat in their native languages, share pictures stored on cloud or emoji’s and many more functions like “Whatsapp”. Challenge: Client required his product to have a high degree of automation and hands off continuous deployment. Solution: The client’s application was deployed on servers….

Continue Reading →
0

DevOps Trends and Tenets

Posted by:

DevOps is a philosophy of an efficient development, deployment and operation, of the highest quality software. Developer and Operations are two different roles. Developer is responsible for developing an application which includes planning, designing and architecture whereas operations provide assets which are required to develop an application that includes hardware, software and licenses ensuring delivery of assets….

Continue Reading →
0

How to Implement Infrastructure as Code (IaC)

Posted by:

The idea of Infrastructure as Code (IaC) is same as programming scripts, which are used to automate important IT processes; managing and provisioning computing infrastructure and its configuration through machine-processable definition files. IaC is not simply writing scripts. It also involves tested and proven software development practices….

Continue Reading →
0

Upgrading Network Infrastructure to Save Cost

Posted by:

24/7 Network Engineers thoroughly inspected one of their client’s local network infrastructure and were able to suggest and implement a few improvements.
The client had an on-site team of few developers and a small data center. so that the uninterrupted network connectivity was a top priority. In order to avoid network outage, the client was using connections of 3 different Internet providers. He was also using a proprietary Load Balancer for managing the traffic in such a way that the …

Continue Reading →
0

IP Tables State

Posted by:

24/7 Network Engineers came across a situation where the server intermittently became inaccessible. After troubleshooting the issue, they came to know that a few IP addresses were hammering the server, due to which legitimate connections were rejected.
IPTState is a utility that shows net filter connection tracking table in a “Top” format. It keeps an eye on traffic crossing net filter/Iptables firewall, interactively. It is very informative while tracking the network connection as well as the vulnerability of code for …

Continue Reading →
0

Migrating Virtual Machines to Amazon AMI

Posted by:

Virtual machines are being used to deploy an environment of Linux or Windows without manipulating the original OS on hard drive. You can easily migrate virtual machine images from your existing environment to Amazon AMI and destroy them from your PC. For this conversion. you need to fulfill the pre-requisite requirements.
Firstly, you have to create a virtual machine with a Single Disk HDD attached to it. During its creation, there are options of either using a Single Disk or …

Continue Reading →
0

AWS CloudWatch – Defining Custom Metric

Posted by:

Amazon CloudWatch is a web service that provides real-time monitoring to Amazon’s EC2 customers on their resource utilization such as CPU, hard disk and network. CloudWatch does not provide any memory, disk space, or load average metrics without running additional software on the instance. Amazon provides example scripts for Linux instances. The data is aggregated and provided through AWS management console. It can also be accessed through command line tools and Web APIs, if the customer desires to monitor their …

Continue Reading →
0

Host-Based Intrusion Detection System (HIDS)

Posted by:

Web server security is one of the most crucial issues faced by SysAdmins and DevOps. Servers are targeted using techniques such as cross-site scripting (XSS) and SQL injection. Having a WAF (Web Application Firewall) helps in mitigating most of the commonly known attacks, but it is still not enough to keep track of any authorized and unauthorized activity in the system.
This is where Host Based Intrusion Detection System (HIDS) is required. HIDS is a system that monitors and analyzes …

Continue Reading →
0

Hard Disk Error Detection using S.M.A.R.T

Posted by:

Problem24/7 Network Engineers faced a hard disk problem while building RAID array for one of their servers. One of the disks had a few bad sectors that caused a crash during Raid build. ‘n’ numbers of hard disk plugin had to be called ‘n’ number of times.
24/7 Network Engineers faced a hard disk problem while building RAID array for one of their servers. One of the disks had a few bad sectors that caused a crash during Raid build. …

Continue Reading →
0
Page 1 of 5 12345

# #