How to test Logjam Attack (CVE-2015-4000) and fix?

We earn commission when you buy through affiliate links. This does not influence our reviews or recommendations.Learn more. The Logjam vulnerability helps attacker (man-in-the-middle) to downgrade TLS connections to 512-bit export-grade cryptography. This helps an attacker to read and modify any data transmitted over the web connection connection. This reminds me ofFREAK attack. Logjam vulnerability can be on any protocols like HTTPS, SSH, IPSec, SMTP that leverage on TLS. As of 24thMay, there are8....

May 24, 2015 · 1 min · 145 words · Greg Cooper

Useful WebSphere Application Server Configuration Guide

We earn commission when you buy through affiliate links. This does not influence our reviews or recommendations.Learn more. However, there are specific configurations you must be aware as a WebSphere administrator. The following 15 configurations are often touched or asked in an interview. If you are a beginner, I strongly you recommend you go through my previous two articles. WebSphere tool Server ND Installation Guide Useful WebSphere tool Server Administration Scripts...

May 20, 2015 · 2 min · 392 words · Christopher Anderson

configure: error: C compiler cc is not found

We earn commission when you buy through affiliate links. This does not influence our reviews or recommendations.Learn more. I thought to document so others can be benefited from it. Solution This usually happens when you dont have C/GCC compiler installed on your server. All you got to do is to installgccto resolve this. If using CentOS 8 then you might use the DNF command. Once installed, you could verify as below....

April 25, 2015 · 1 min · 83 words · William Myers

14 Useful Linux Networking Commands

We earn commission when you buy through affiliate links. This does not influence our reviews or recommendations.Learn more. Configuring, monitoring, and securing networks form an essential part of a Sysadmins job. When it comes to managing Linux networks, there are many commands and utilities available. At times networked systems fail. You as an administrator are required to diagnose and resolve issues. Monitoring helps in detecting problems and fixing them before things get out of hand....

February 15, 2015 · 4 min · 802 words · David Bush

15 Top Tools to Check Website Uptime in 2025

We earn commission when you buy through affiliate links. This does not influence our reviews or recommendations.Learn more. Get notified when your website goes down, slow, or has an error with website monitoring tools. Your website can go down for various reasons, including a database down or a hack. Ive listed the following tools, which will help you get notified in case your web URL goes down. Most of them offer a FREE plan, so try some of them and pick the one you like....

February 15, 2015 · 3 min · 428 words · Elizabeth Dixon

18 Best SEO Analysis Tools to Improve Your Ranking

We earn commission when you buy through affiliate links. This does not influence our reviews or recommendations.Learn more. Are you lost in the SEO world about what and how to do? Well, you are not alone. Most of the following areFREE,so what are you waiting for? Try them and see what works best for you. Tons of actionable data. You name it, and youll have it. SEMrush is for anyone serious about winning in the competitive market....

February 15, 2015 · 2 min · 403 words · Dr. Timothy Harrison

Decrypt Stash File

We earn commission when you buy through affiliate links. This does not influence our reviews or recommendations.Learn more. Dont worry, it happens! The easiest way to decrypt the .sth file with below Perl code. This will decrypt the stash file. You may watch this demonstration in below video. https://www.youtube.com/watch?v=e6bHPqydO9U Interested in learning about IBM Cloud? Check out thisonline course.

February 15, 2015 · 1 min · 59 words · Elizabeth Hatfield

Disable Security in IBM WebSphere Application Server

We earn commission when you buy through affiliate links. This does not influence our reviews or recommendations.Learn more. There might be a situation where you should probably kill the security to get into WAS DMGR console. There are two ways to shut down the security. So choose the one you like. First procedure using wsadmin attempt to access WAS DMGR Console now, and itshouldnt promptfor any credential. Second procedure modifying security....

February 15, 2015 · 1 min · 121 words · John Maldonado

Generate Heap Dump, Java Core & System Dump in WebSphere

We earn commission when you buy through affiliate links. This does not influence our reviews or recommendations.Learn more. This is possible either usingWAS Admin ConsoleorCommand line. Based on your preference, you’re able to choose the method. Using WebSphere Administrative Console Dump & Core will be generated under WebSphere profile location. You will get the absolute path under the message. Using Command Line Note:server1is for example. Change this to your actual JVM name....

February 15, 2015 · 1 min · 120 words · Jesus Baker

How to Auto-start Services on Boot in Linux?

We earn commission when you buy through affiliate links. This does not influence our reviews or recommendations.Learn more. There could be various reasons for server reboot, including the following. By doing the right configuration, you dont have to start them manually each time you reboot. A little bit of automation. The following examples are for two popular distros tested onDigitalOceanservers. Thats all!httpdscript will be called to start services on Linux boot....

February 15, 2015 · 1 min · 115 words · Scott Thompson

How to Generate and Analyse WebSphere Thread Dump?

We earn commission when you buy through affiliate links. This does not influence our reviews or recommendations.Learn more. As aWebSphere administrator, you should be aware of taking thread dumps and tools to analyze them. Taking Thread Dumps in WebSphere Its recommended to take multiple thread dumps in 5-8 seconds. you might use any of the following methods to generate it. Using wsadmin.sh Note:server1is, for example. Change this to your actual JVM name....

February 15, 2015 · 1 min · 158 words · Shannon Adams

How to Generate Thread Dump in WebLogic

We earn commission when you buy through affiliate links. This does not influence our reviews or recommendations.Learn more. If you are looking for in-depth knowledge on WebLogic, you may consider takingOracle WebLogic 12c forAdministrators online course.

February 15, 2015 · 1 min · 36 words · Cindy Reyes

netstat Command Usage on Linux

We earn commission when you buy through affiliate links. This does not influence our reviews or recommendations.Learn more. Learn what netstat command and some of the real-time examples are. If you typenetstat -help, you will get the following usage guidelines. Let me show you some of the examples of the command. Established Connection If you are looking for all established connections from the server. Or, you’ve got the option to use-largument to show all the listening sockets....

February 15, 2015 · 1 min · 213 words · Sarah Randolph