Debian provides MySQL server 5.5 with both wheezy and jessie but the latest GA (Generally Available) releases are 5.6 and 5.7 with some enhancements and added features, including support for InnoDB Full-text search.
Here’s how to install MySQL server 5.6 or 5.7 on Debian based Linux distros (including wheezy, jessie and Ubuntu):
1. Download the MySQL APT repository config tool (you can see more details here: http://dev.mysql.com/downloads/repo/apt/)
The Geo backend can be used to distribute queries globally using an IP-address/country mapping table, several of which are freely available online or can be acquired for a small fee.
This allows visitors to be sent to a server close to them, with no appreciable delay, as would otherwise be incurred with a protocol level redirect. Additionally, the Geo backend can be used to provide service over several clusters, any of which can be taken out of use easily, for example for maintenance purposes.
The Geo backend is in wide use, for example by the Wikimedia foundation, which uses it to power the Wikipedia global load balancing.
This tutorial has been tested on Debian 7.x (wheezy).
SSL 3.0 is an obsolete and insecure protocol recently affected by the POODLE (Padding Oracle On Downgraded Legacy Encryption) vulnerability which allows a man-in-the-middle attacker to decrypt ciphertext using a padding oracle side-channel attack.
SSLv3 has been replaced by TLS which is supported by all modern browsers so it should be safe to disable SSLv3. Continue reading →
Shellshock vulnerability is a security bug affecting Unix/Linux operating system through the bash shell. Disclosed on September 24 2014, it has been rated 10 (the maximum score) for severity by NIST. Debian installs bash by default so you’re probably affected!
To check if your server is vulnerable, run this command:
This is a serious bug affecting a lot of servers including Debian Wheezy. Act fast because everything is being scanned and information is being leaked right now!
The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.
It’s really easy to use to bug to steal information from affected systems without having any access to it or the network. To check if your server is infected and see what information it is exposing you can use this python script: hb-test.py
To use the script, make sure you have python installed and run the following command:
Adding a additional hard disk to your workstation or server is easy and often required. Here’s we’ll step through the process of identifing the newly attached drive, prepare and mount it by referencing UUID which is a preferred method today.
If you have just added a virtual disk to a virtual machine, make sure you restart the virtual machine before mounting the new disk.
Nginx is an open source reverse proxy server, load balancer, HTTP cache, and a web server. The Nginx project started with a strong focus on high concurrency, high performance and low memory usage. Users have been moving to Nginx because of the high performance and stability and as of February 2014, Nginx is hosting around 15% of all web servers according to Netcraft’s Web Server Survey.
In this tutorial we’ll cover install and configuring Nginx, PHP (with PHP-FPM) and MySql server.