Skip to main content

Posts

Showing posts from January, 2018

RDP fixed display resolution.

Hello Fellas, RDP was built by Microsoft to take remote control and always kept the resolution dynamic which is out of control sometime as it detect underneath hardware and accordingly adjust the resolution of machine/server which you have taken. MSTSC.exe /h:800/w:1080 (Whatever resolution you like) and now RDP will take that resolution all the time.

"kerberos: the specified credentials were rejected by the server", "unreachable": true" Ansible

Hello Friends, I was getting following Error while deploying my Ansible script, Basically my credential were getting rejected by server. SSH password: PLAY [Playbook_Name] ***************************************************************02:00:30 TASK [Gathering Facts] *********************************************************02:00:30 fatal: [Server_Inventory_Name]: UNREACHABLE! => {"changed": false, "msg": "kerberos: the specified credentials were rejected by the server", "unreachable": true} PLAY RECAP *********************************************************************02:00:30 Server_Inventory_Name    : ok=0    changed=0    unreachable=1   failed=0  It was resolved using one additional parameter in Inventory  i.e  "ansible_winrm_server_cert_vaildation:ignore"

Kernel Side-Channel Attacks- Red Hat.

Red Hat has been made aware of multiple microarchitectural (hardware) implementation issues affecting many modern microprocessors, requiring updates to the Linux kernel, virtualization-related components, and/or in combination with a microcode update.  An unprivileged attacker can use these flaws to bypass conventional memory security restrictions in order to gain read access to privileged memory that would otherwise be inaccessible. There are 3 known CVEs related to this issue in combination with Intel, AMD, and ARM architectures. Additional exploits for other architectures are also known to exist. These include IBM System Z,  POWER8 (Big Endian and Little Endian), and POWER9 (Little Endian). Impact:- The following Red Hat product versions are impacted: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Red Hat Atomic Host Red Hat Enterprise MRG 2 Red Hat OpenShift Online v2 Red Hat OpenShift Online v3 Red Hat Virtualization (

Crypto Mining

Mining is the process of adding transaction records to Bitcoin's public ledger of past transactions (and a " mining rig " is a colloquial metaphor for a single computer system that performs the necessary computations for "mining"). This ledger of past transactions is called the  block chain  as it is a chain of  blocks . The block chain serves to  confirm  transactions to the rest of the network as having taken place. Bitcoin nodes use the block chain to distinguish legitimate Bitcoin transactions from attempts to re-spend coins that have already been spent elsewhere. Mining is intentionally designed to be resource-intensive and difficult so that the number of blocks found each day by miners remains steady. Individual  blocks  must contain a  proof of work  to be considered valid. This proof of work is verified by other Bitcoin nodes each time they receive a block. Bitcoin uses the  hashcash  proof-of-work function. The primary purpose of mining is to allo