Aug 22, 2017 | Malicious Code, Nginx, PHP, Ubuntu 14.04 Server
#trigger by wordpress https://wordpress.org/support/topic/link-templatephpsuspected/ cd /path/to/scan egrep -Rl '\$GLOBALS.*\\x|function.*for.*strlen.*isset|isset.*eval' *
Aug 16, 2017 | MySQL, Ubuntu 14.04 Server
Generating SSL Certificates for MySQL Daemon using openssl. cd /etc/mysql # Generate a CA key and certificate with SHA1 digest openssl genrsa 2048 > ca-key.pem openssl req -sha1 -new -x509 -nodes -days 3650 -key ca-key.pem > ca-cert.pem # Create server key and certficate with SHA1 digest, sign it and convert # the RSA key from PKCS #8 (OpenSSL 1.0 and newer) to the old PKCS #1 format openssl req -sha1 -newkey rsa:2048 -days 730 -nodes -keyout server-key.pem > server-req.pem openssl x509 -sha1 -req -in server-req.pem -days 730 -CA ca-cert.pem -CAkey ca-key.pem -set_serial 01 > server-cert.pem openssl rsa -in server-key.pem -out server-key.pem # Create client key and certificate with SHA digest, sign it and convert # the RSA key from PKCS #8 (OpenSSL 1.0 and newer) to the old PKCS #1 format openssl req -sha1 -newkey rsa:2048 -days 730 -nodes -keyout client-key.pem > client-req.pem openssl x509 -sha1 -req -in client-req.pem -days 730 -CA ca-cert.pem -CAkey ca-key.pem -set_serial 01 > client-cert.pem openssl rsa -in client-key.pem -out client-key.pem # Ensure mysql user got the right access chown mysql:adm *.pem # Configure MySQL to use the certificates nano my.cnf add lines ssl=1 ssl-ca=/etc/mysql/ca-cert.pem ssl-cert=/etc/mysql/server-cert.pem ssl-key=/etc/mysql/server-key.pem service mysql restart [/code] tadaaa! hope this...