Skip to main content

Posts

Showing posts from 2018

End of Public Updates for Oracle JDK 8

Oracle has announced that, effective January 2019, Java SE 8 public updates will no longer be available for "Business, Commercial or Production use" without a commercial license. Please read: - Oracle Java SE 8 Release Updates Oracle Java SE support Roadmap End of Public Updates for Oracle JDK 8 Oracle will not post further updates of Java SE 8 to its public download sites for commercial use after January 2019. Customers who need continued access to critical bug fixes and security fixes as well as general maintenance for Java SE 8 or previous versions can get long term support through Oracle Java SE Advanced Desktop, or Oracle Java SE Suite. For more information, and details on how to receive longer term support for Oracle JDK 8, please see the  Oracle Java SE Support Roadmap .

Android - Patching

Android phones will also going to get patch monthly. https://www.google.com/amp/s/m.gsmarena.com/google_will_require_that_phone_makers_roll_out_monthly_security_updates_-amp-30995.php Attached image: No description set. 2018-05-11_19-22-49-628.jpg Click to open full-page preview.

Google-Facebook Privacy

https://myactivity.google.com/myactivity The one big thing that has come out of the whole Facebook-Cambridge Analytica scandal is that people are more aware of their privacy. Prior to it, there weren’t too many questions being asked. Knowingly or unknowingly most of us shared our data without a second thought of where is it going and who’s sharing what. Not anymore though as there’s a greater sense of awareness. And companies like Google and Facebook are becoming more transparent with how your data is being used. Recently, Google came out with new privacy policy and is letting users “understand” what information is being collected.

"Passion, Hunger and Discipline"

Yesterday Prakash Iyer -Author and Ex-CEO Mumbai Indians has said in the event I.e. Every technical leader should have PhD. "Passion, Hunger and Discipline" What PhD he meant is explain here - Must read. https://googleweblight.com/i?u=https://www.careers360.com/news/6526-Prakash-Iyer_Motivation&hl=en-IN

China cloud policies and regulations!

China cloud policies and regulations To host a website on a server located in mainland China, you must apply for a state-issued registration number: either the ICP license for commercial entities or the ICP filing for non-commercial entities ICP filing numbers are displayed in the small print in website footers of the home page, and should be displayed on your website at all times.   https://docs.microsoft.com/en-us/azure/china/china-overview-policies#step-1-icp-license-and-filing Attached image: No description set. 2018-05-11_01-25-34-959.jpg Click to open full-page preview.

Internet using Electric cables

I have just resolved one of my longest unresolved open problem at home i.e. my router was not able to get pass through walls, as it was setup in other room WIFI signals were weak or even negligence in Hall/Living room and it needs to resolve, I have tried upgrading router to better bands, but problem was same. so finally came across product which converts or sends internet signals over copper cables. one adapter connects physically next to your router and other can be setup anywhere at your home connected to same electrical cables which decodes the signal and give you good quality internet. How does it work! Please find attached screenshot. The Product which I am using is TPLINK Powerline AV600! (Its not your WiFi extender which needs to be in same range and try to boost) its like extending physical internet cable experience over copper electric cables. In detail: The Powerline solution is less visible − a 'no new wires' approach. You buy a basic kit, which comes with ...

RDP fixed display resolution.

Hello Fellas, RDP was built by Microsoft to take remote control and always kept the resolution dynamic which is out of control sometime as it detect underneath hardware and accordingly adjust the resolution of machine/server which you have taken. MSTSC.exe /h:800/w:1080 (Whatever resolution you like) and now RDP will take that resolution all the time.

"kerberos: the specified credentials were rejected by the server", "unreachable": true" Ansible

Hello Friends, I was getting following Error while deploying my Ansible script, Basically my credential were getting rejected by server. SSH password: PLAY [Playbook_Name] ***************************************************************02:00:30 TASK [Gathering Facts] *********************************************************02:00:30 fatal: [Server_Inventory_Name]: UNREACHABLE! => {"changed": false, "msg": "kerberos: the specified credentials were rejected by the server", "unreachable": true} PLAY RECAP *********************************************************************02:00:30 Server_Inventory_Name    : ok=0    changed=0    unreachable=1   failed=0  It was resolved using one additional parameter in Inventory  i.e  "ansible_winrm_server_cert_vaildation:ignore"

Kernel Side-Channel Attacks- Red Hat.

Red Hat has been made aware of multiple microarchitectural (hardware) implementation issues affecting many modern microprocessors, requiring updates to the Linux kernel, virtualization-related components, and/or in combination with a microcode update.  An unprivileged attacker can use these flaws to bypass conventional memory security restrictions in order to gain read access to privileged memory that would otherwise be inaccessible. There are 3 known CVEs related to this issue in combination with Intel, AMD, and ARM architectures. Additional exploits for other architectures are also known to exist. These include IBM System Z,  POWER8 (Big Endian and Little Endian), and POWER9 (Little Endian). Impact:- The following Red Hat product versions are impacted: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Red Hat Atomic Host Red Hat Enterprise MRG 2 Red Hat OpenShift Online v2 Red Hat OpenShift Online v3 Red Hat Virtual...

Crypto Mining

Mining is the process of adding transaction records to Bitcoin's public ledger of past transactions (and a " mining rig " is a colloquial metaphor for a single computer system that performs the necessary computations for "mining"). This ledger of past transactions is called the  block chain  as it is a chain of  blocks . The block chain serves to  confirm  transactions to the rest of the network as having taken place. Bitcoin nodes use the block chain to distinguish legitimate Bitcoin transactions from attempts to re-spend coins that have already been spent elsewhere. Mining is intentionally designed to be resource-intensive and difficult so that the number of blocks found each day by miners remains steady. Individual  blocks  must contain a  proof of work  to be considered valid. This proof of work is verified by other Bitcoin nodes each time they receive a block. Bitcoin uses the  hashcash  proof-of-work function. The p...