Infrastructure at your Service



Burgert Daniel

Increase your PostgreSQL databases security by checking a few settings Part 2

By | Database Administration & Monitoring, Postgres, Security | No Comments

Continuing from my first blog we will check some more access and authentication configurations. Focusing on removing unnecessary database privileges. After that we will configure the backend parameters correctly to have more robust PostgreSQL server/client sessions. And at last SSL encryption for these sessions will be configured.

Read More
Furkan Suv

SELinux for beginners

By | Operation systems, Security | No Comments

Do you know the following situation: You are following a step by step tutorial on the web and on your environment does not work as expected because of SELinux. Your looking on search engines command how you can disable the SELinux… Does that sound familiar? On this Blog I will explain what SELinux are, where and how to use is. Let’s start! What is SELinux and why should I not disable it? SE stands for…

Read More
Elisa Usai

The evolution of MySQL authentication mechanism

By | Database Administration & Monitoring, Database management, MySQL, Security | No Comments

The authentication, the first level of security for each IT system, is the stage to verify the user identity through the basic username and password scheme. It is crucial to have a mechanism to protect and secure password storing and transmitting over network. In MySQL, there is plenty of different authentication methods available, and last versions improved the security of this concept.

Read More
Stéphane Savorgnano

Recover data from Azure backup

By | Operation systems, Security, Technology Survey | No Comments

During my last blog-post I experienced to use Azure backup to protect an on-premise Windows server. To recover data from Azure backup we need to use the Microsoft Azure Recovery Services console (MARS). This service and its management console have been installed during the setup of the Azure backup in the Windows Admin Center. When we open the Microsoft Azure Backup console, we directly visualize the jobs activity for the last 7 days in the…

Read More
Dominique Althuser

Email Spoofing

By | Security | No Comments

Have you ever had this unhealthy sensation of being accused of facts that do not concern you? To feel helpless in the face of an accusing mail, which, because of its imperative and accusing tone, has the gift of throwing us the opprobrium? This is the purpose of this particular kind of sextortion mail that uses spoofing, to try to extort money from you. A message from a supposed “hacker” who claims to have hacked…

Read More
Elisa Usai

MySQL 8.0 – Roles are finally there

By | Database Administration & Monitoring, MySQL, Security | No Comments

Roles have been existing on many RDBMS for a long time by now. Starting from version 8.0, this functionality is finally there for MySQL. The most important advantage is to define only once a role that includes a “set of permissions”, then assign it to each user, avoiding wasting time declaring them individually. In MySQL, a role can be created like a user, but without the “identified by” clause and without login: mysqld2-([email protected]) [(none)]> CREATE…

Read More