DevOoops Increase awareness around DevOps infra security. Gianluca
|
|
|
- Ralf Holland
- 10 years ago
- Views:
Transcription
1 DevOoops Increase awareness around DevOps infra security Gianluca
2 $ whoami VP Rocket Internet SE Formerly at Red Hat, Lastminute.com Group, PrivateWave
3 What is DevOps? DevOps is about creating a conveyor belt to systematically pull together all of the pieces that need to go into production using automation to create a safe and reliable application deployment.
4 Why Security needs DevOps
5 How vulnerabilities get introduced Configuration errors Missing patch Human mistake (bad OPSEC) Coding mistake
6 alias devops=sudo We learned (the HARD WAY) that DevOps is more than giving root to developers.
7 DevOps Borat
8 Agenda 01 GitHub 02 RCS tools 03 CI tools 04 AWS config files 05 Client provisioning tools 06 Elasticsearch 07 In-memory databases 08 Docker
9 GitHub
10 GitHub - Search It does support advanced search operators, eg. extension:conf ftp server configuration extension:pem private extension:xls mail extension:sql mysql dump extension:php preg_replace( /(.+)/e (RCE) OSINT (within companies and employees repos)
11 GitHub Impersonating others Pushing code to GitHub as Linus Torvalds? People trust pictures!
12 GitHub Impersonating others / 2 Hey, look! Linus is the main committer of my github.com:gvarisco/swag.git repo! Sad truth! Design flaw or targeted feature? Official response below..
13 GitHub Learnings / TODOs Always audit who has access to your repos Be suspicious of pull requests with other authors code within the PR. Always delete a private fork of a private organization repository if a member leaves your organization. Audit organization members for 2-step verification
14 RCS Tools
15 .git exposure Does your website expose the.git/ folder on a webserver out there? Access to such content lets you download the full source code tl;dr: NO, Turning DirectoryIndex (Apache) / autoindex (nginx) ON/OFF is NOT the fix!
16 .git exposure / What can you get? Source code, config files, credentials, developer names, public/private keys, SSL certificates, addresses, etc. Repo HISTORY (security issues fixed, password wrongly committed and removed later) Archives / backups {My,Postgre,XYZ}SQL dumps Session generation keys
17 .git exposure / DirectoryIndex ON $ mkdir website-source-code $ cd website-source-code $ wget mirror include-directories=/.git $ cd $ git reset hard HEAD is now at [ ]
18 .git exposure / DirectoryIndex OFF Git-fsck to the rescue! Bruteforce: Predictable file names and known object hashes, etc. DVCS-{Pillage,Ripper} do it for you Many admins tend to answer either 403 or 404 for.git/ but.git/config works just fine. Git stores file information within the objects folder.
19 Abusing the.git/ Objects folder See the SHA-1 for index.php: $ git cat-file p master^{tree} Take the SHA-1 and give it to git cat-file to print out the file contents:
20 Subversion 1.6.x 1.6.x and earlier Check for.entries files Walk SVN chain to retrieve all files. Metasploit does it for you (auxiliary/scanner/http/svn_scanner)
21 Subversion 1.7.x 1.7.x uses SQLite. Metasploit s auxiliary/scanner/http/ svn_wcdb_scanner to the rescue! It will retrieve SVN s wc.db for you As we know the file name and the SHA-1 used, we can map all files.
22 Subversion 1.7.x $ sqlite3 wc.db 'select local_relpath, ".svn/pristine/" substr(checksum,7,2) "/" substr(checksum,7) ".svn-base" as alpha from NODES; index.php.svn/pristine/4e/4e6a225331f9ae872db25a8f85ae7be05cea6d51.svn-base style/style.js.svn/pristine/2s/2cc5590e0ba024c3db77a13896da09b39ea74799.svnbase... $ wget -O - 4e6a225331f9ae872db25a8f85ae7be05cea6d51.svn-base <?php
23 CI Tools
24 Jenkins The leading open-source continuous integration server. Built in Java, it provides 985 plug-ins to support building and testing virtually any project. Latest and greatest release: A few security advisories
25 Jenkins Searches on Shodan
26 Abusing Jenkins Metasploit modules: auxiliary/scanner/http/jenkins_enum (It enumerates a remote Jenkins installation in an unauthenticated manner, including host OS and Jenkins installation details) exploit/multi/http/jenkins_script_console (It uses the Jenkins Groovy script console to execute OS commands using Java.) If no authentication is required, it is trivial to gain remote code execution via script console.
27 Abusing Jenkins Script console Wanna display jenkins user private SSH key? No problem! It is as simple as executing: println new ProcessBuilder('sh','-c','cat /Users/batman/.ssh/ id_rsa').redirecterrorstream(true).start().text
28 Abusing Jenkins Last, but not least: If you have access to /view/all/newjob, create new builds and run commands. Browse WORKSPACEs, read config / folders containing sensitive data, eg. credentials, API keys
29 AWS config files
30 AWS config files ALL credentials are stored in plain-text in hidden files, eg. /home/gvarisco/.foo/bar Typically privileged accesses Once credentials are found, any of the OSS libraries available out there can interact with AWS (eg. Nimbostratus, AWS CLI tools) OSINT / Information leakage via GitHub, Pastebins, etc.
31 Provisioning tools
32 Puppet If you expose a dashboard (eg. PuppetBoard/PuppetDB) be careful with your custom FACTS Encrypt your sensitive YAML files information (if you use HIERA, a key/value lookup tool for config data) with HIERA-EYAML It does provide asymmetric encryption of sensitive data Store the keys securely when using puppet, as only the puppetmaster needs access to them in order to perform decryption when the agent runs on a remote node
33 Puppet Hiera-EYAML
34 Chef Web Interface (Chef Server), Rails powered, uses admin / p@ssw0rd1 as default credentials
35 Chef Databags items (eg. MySQL data) can be encrypted Use knife a cli tool that provides an interface between a local chef-repo and the Chef server
36 Vagrant Did you change your SSH keys? Vagrant 1.7+ embeds vagrant-rekey-ssh plug-in
37 Vagrant Common user/passwords: root/vagrant OR vagrant/vagrant NO pass to sudo
38 Vagrant Scans using the default private key
39 Vagrant breaking in! Vagrant workflows encourage you to edit your code outside the VM. That s why it helpfully shares the project directory as /vagrant/ in the VM. Put evil things in /vagrant/.git/hooks/post-commit and wait for the user to commit some code. Since the /vagrant/ directory is mounted from the host, such hook will persist even if the user destroys the VM.
40 Kickstart files (Red Hat, CentOS, ) Root passwords are either set: During installation Crypted hash defined in the KS file (rootpw iscrypted) Clear text defined in the KS file (rootpw plaintext)
41 Elastisearch
42 Elasticsearch A distributed full-text search engine with a RESTful web interface and schema-free JSON documents 9200/TCP (GET request shows version) No authentication Can search stored data via HTTP API Update data with PUT requests Join an existing, open cluster and get all the data REMOTE CODE EXECUTION prior to 1.2.0
43 Elasticsearch Own a server with a query like this (as the search function allows dynamic scripts execution): 1.3.x adds a sandbox to control what classes and functions can be executed. Add script.disable_dynamic: true to your elasticsearch.yml Make sure your instance is only binding on localhost
44 Elasticsearch read inside /etc
45 In-memory databases
46 Redis Default config comes with: NO encrypted communication NO credentials 6379/TCP Binds to all interfaces
47 Redis Shodan results
48 Abusing Redis instances
49 Redis Funny commands FLUSHALL (Remove all keys from all databases) SCRIPT LOAD EVAL / EVALSHA
50 Memcache Free & open-source High-performance, distributed memory object caching system Fun things get put into memcache SECURE IT: First and always, FIREWALL Check your bindings (interfaces) If you need it, use SASL DO NOT RUN AS ROOT
51 Memcache interesting findings
52 Docker
53 Docker It automates the deployment of applications inside software containers Docker works as a client that communicates with a daemon process (dockerd) via a Unix domain socket called /var/run/ docker.sock Highly privileged, effectively having root access
54 Don t expose the Docker socket! Error: # docker run -t -i -v /var/run/docker.sock:/var/run/docker.sock PoC: The container gets a docker client of its own, pointed at the /var/run/docker.sock The container launches a new container mounting / on /host (It s the host root filesystem, not the first container s) The second container chroots to /host, and is now effectively root on the host..
55 Video
56
57 And now what? Add authentication to Jenkins Make sure all your tools / systems are only available from/to hosts that need it Change default private keys / credentials EVERYWHERE Update to latest versions of all your devops tools
58 Go forward Don t push DevOps back but rather embrace it. Participate in or create cookbooks/modules/scripts for security Check for known security items you don t want going into production by creating audit scripts
59 THANKS! Questions?
60 Credits Ken Johnson Chris Gates Laurens Van Houtven Rocket Internet s Security Team
61 2015 Rocket Internet SE. All rights reserved.
DevOps Course Content
DevOps Course Content INTRODUCTION TO DEVOPS What is DevOps? History of DevOps Dev and Ops DevOps definitions DevOps and Software Development Life Cycle DevOps main objectives Infrastructure As A Code
depl Documentation Release 0.0.1 depl contributors
depl Documentation Release 0.0.1 depl contributors December 19, 2013 Contents 1 Why depl and not ansible, puppet, chef, docker or vagrant? 3 2 Blog Posts talking about depl 5 3 Docs 7 3.1 Installation
DevOps. Building a Continuous Delivery Pipeline
DevOps Building a Continuous Delivery Pipeline Who Am I Bobby Warner Founder & President @bobbywarner What is the goal? Infrastructure as Code Write code to describe our infrastructure Never manually execute
SVNManager Installation. Documentation. Department of Public Health Erasmus MC University Medical Center
SVNManager Installation Documentation M. Verkerk Department of Public Health Erasmus MC University Medical Center Page 2 July 2005 Preface Version control in the context of this document is all about keeping
CI Pipeline with Docker 2015-02-27
CI Pipeline with Docker 2015-02-27 Juho Mäkinen, Technical Operations, Unity Technologies Finland http://www.juhonkoti.net http://github.com/garo Overview 1. Scale on how we use Docker 2. Overview on the
Secure your Docker images
Secure your Docker images With Notary and Yubikey Dr. Udo Seidel Agenda Introduction The Update Framework Notary Yubikey Getting started Summary Me :-) Teacher of mathematics and physics PhD in experimental
Building a Continuous Integration Pipeline with Docker
Building a Continuous Integration Pipeline with Docker August 2015 Table of Contents Overview 3 Architectural Overview and Required Components 3 Architectural Components 3 Workflow 4 Environment Prerequisites
Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery
Overview Password Manager Pro offers a complete solution to control, manage, monitor and audit the entire life-cycle of privileged access. In a single package it offers three solutions - privileged account
QuickStart Guide for Managing Computers. Version 9.2
QuickStart Guide for Managing Computers Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software
RecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
Source Code Management for Continuous Integration and Deployment. Version 1.0 DO NOT DISTRIBUTE
Source Code Management for Continuous Integration and Deployment Version 1.0 Copyright 2013, 2014 Amazon Web Services, Inc. and its affiliates. All rights reserved. This work may not be reproduced or redistributed,
Online Backup Linux Client User Manual
Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might
Online Backup Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
StriderCD Book. Release 1.4. Niall O Higgins
StriderCD Book Release 1.4 Niall O Higgins August 22, 2015 Contents 1 Introduction 3 1.1 What Is Strider.............................................. 3 1.2 What Is Continuous Integration.....................................
Continuous Integration using Docker & Jenkins
Jenkins LinuxCon Europe 2014 October 13-15, 2014 Mattias Giese Solutions Architect [email protected] - Linux/Open Source Consulting, Training, Support & Development Introducing B1 Systems founded in
A central continuous integration platform
A central continuous integration platform Agile Infrastructure use case and future plans Dec 5th, 2014 1/3 The Agile Infrastructure Use Case By Stefanos Georgiou What? Development practice Build better
Architecture and Mode of Operation
Software- und Organisations-Service Open Source Scheduler Architecture and Mode of Operation Software- und Organisations-Service GmbH www.sos-berlin.com Scheduler worldwide Open Source Users and Commercial
Online Backup Client User Manual
Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have
DiamondStream Data Security Policy Summary
DiamondStream Data Security Policy Summary Overview This document describes DiamondStream s standard security policy for accessing and interacting with proprietary and third-party client data. This covers
Linux A first-class citizen in Windows Azure. Bruno Terkaly [email protected] Principal Software Engineer Mobile/Cloud/Startup/Enterprise
Linux A first-class citizen in Windows Azure Bruno Terkaly [email protected] Principal Software Engineer Mobile/Cloud/Startup/Enterprise 1 First, I am software developer (C/C++, ASM, C#, Java, Node.js,
Content Distribution Management
Digitizing the Olympics was truly one of the most ambitious media projects in history, and we could not have done it without Signiant. We used Signiant CDM to automate 54 different workflows between 11
1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
DevShop. Drupal Infrastructure in a Box. Jon Pugh CEO, Founder ThinkDrop Consulting Brooklyn NY
DevShop Drupal Infrastructure in a Box Jon Pugh CEO, Founder ThinkDrop Consulting Brooklyn NY Who? Jon Pugh ThinkDrop Consulting Building the web since 1997. Founded in 2009 in Brooklyn NY. Building web
Online Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
Cloud Security with Stackato
Cloud Security with Stackato 1 Survey after survey identifies security as the primary concern potential users have with respect to cloud computing. Use of an external computing environment raises issues
CHEF IN THE CLOUD AND ON THE GROUND
CHEF IN THE CLOUD AND ON THE GROUND Michael T. Nygard Relevance [email protected] @mtnygard Infrastructure As Code Infrastructure As Code Chef Infrastructure As Code Chef Development Models
EZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.11 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
owncloud Architecture Overview
owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443
Version Control Your Jenkins Jobs with Jenkins Job Builder
Version Control Your Jenkins Jobs with Jenkins Job Builder Abstract Wayne Warren [email protected] Puppet Labs uses Jenkins to automate building and testing software. While we do derive benefit from
Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux.
Red Hat Enterprise Linux 7- RH124 Red Hat System Administration I Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux. This course will actively engage students
ALERT installation setup
ALERT installation setup In order to automate the installation process of the ALERT system, the ALERT installation setup is developed. It represents the main starting point in installing the ALERT system.
HP ProLiant Essentials Vulnerability and Patch Management Pack Server Security Recommendations
HP ProLiant Essentials Vulnerability and Patch Management Pack Server Security Recommendations Security Considerations for VPM and HP SIM Servers Introduction... 3 External patch acquisition... 4 Comparing
CPSC 491. Today: Source code control. Source Code (Version) Control. Exercise: g., no git, subversion, cvs, etc.)
Today: Source code control CPSC 491 Source Code (Version) Control Exercise: 1. Pretend like you don t have a version control system (e. g., no git, subversion, cvs, etc.) 2. How would you manage your source
Casper Suite. Security Overview
Casper Suite Security Overview JAMF Software, LLC 2015 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software 301 4th Ave S Suite
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes
STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes June 2011 Table of Contents Overview... 3 Installation Overview... 3 Hosting System Requirements... 4 Recommended
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
System Management. What are my options for deploying System Management on remote computers?
Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What
Administration Guide NetIQ Privileged Account Manager 3.0.1
Administration Guide NetIQ Privileged Account Manager 3.0.1 December 2015 www.netiq.com/documentation Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use
AWS CodePipeline. User Guide API Version 2015-07-09
AWS CodePipeline User Guide AWS CodePipeline: User Guide Copyright 2015 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection
Avira Update Manager User Manual
Avira Update Manager User Manual Table of contents Table of contents 1. Product information........................................... 4 1.1 Functionality................................................................
24x7 Scheduler Multi-platform Edition 5.2
24x7 Scheduler Multi-platform Edition 5.2 Installing and Using 24x7 Web-Based Management Console with Apache Tomcat web server Copyright SoftTree Technologies, Inc. 2004-2014 All rights reserved Table
December 2015 702P00860. Xerox App Studio 3.0 Information Assurance Disclosure
December 2015 702P00860 Xerox App Studio 3.0 Information Assurance Disclosure 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey are trademarks of Xerox Corporation
Internal Penetration Test
Internal Penetration Test Agenda Time Agenda Item 10:00 10:15 Introduction 10:15 12:15 Seminar: Web Application Penetration Test 12:15 12:30 Break 12:30 13:30 Seminar: Social Engineering Test 13:30 15:00
VMware vcenter Log Insight Administration Guide
VMware vcenter Log Insight Administration Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Nixu SNS Security White Paper May 2007 Version 1.2
1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle
Architecture Overview
Qubell Adaptive Platform-as-a-Service, Enterprise Edition Architecture Overview 4600 Bohannon Drive, Menlo Park, CA 94025 T 888 855-8940 http://qubell.com Introduction Introduction Qubell Adaptive Platform-as-a-Service
LoadRunner and Performance Center v11.52 Technical Awareness Webinar Training
LoadRunner and Performance Center v11.52 Technical Awareness Webinar Training Tony Wong 1 Copyright Copyright 2012 2012 Hewlett-Packard Development Development Company, Company, L.P. The L.P. information
Continuous Integration and Delivery. manage development build deploy / release
Continuous Integration and Delivery manage development build deploy / release test About the new CI Tool Chain One of the biggest changes on the next releases of XDK, will be the adoption of the New CI
owncloud Architecture Overview
owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data
BeBanjo Infrastructure and Security Overview
BeBanjo Infrastructure and Security Overview Can you trust Software-as-a-Service (SaaS) to run your business? Is your data safe in the cloud? At BeBanjo, we firmly believe that SaaS delivers great benefits
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
VoipSwitch Security Audit
VoipSwitch Security Audit Security audit was made at 1 st January 2013 (3.00 PM 10.00 PM UTC +1) by John Doe who is Security Advisor at VoipSwitch Company. Server's IP address : 11.11.11.11 Server has
BMC BladeLogic Client Automation Installation Guide
BMC BladeLogic Client Automation Installation Guide Supporting BMC BladeLogic Client Automation 8.2.02 January 2013 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Using Delphix Server with Microsoft SQL Server (BETA)
Using Delphix Server with Microsoft SQL Server (BETA) Table of Contents Architecture High level components in linking a SQL Server database to Delphix High level components in provisioning a SQL Server
Simple and powerful site deployment with capistrano
Simple and powerful site deployment with capistrano Kim Pepper [email protected] @scorchio96 d.o: kim.pepper How are you deploying now? FTP, SFTP, SCP? SSH + GIT? Aegir? Drush? Debian packages? Don't
using version control in system administration
LUKE KANIES using version control in system administration Luke Kanies runs Reductive Labs (http://reductivelabs.com), a startup producing OSS software for centralized, automated server administration.
Five Steps to Improve Internal Network Security. Chattanooga ISSA
Five Steps to Improve Internal Network Security Chattanooga ISSA 1 Find Me AverageSecurityGuy.info @averagesecguy [email protected] github.com/averagesecurityguy ChattSec.org 2 Why? The methodical
Is This Your Pipe? Hijacking the Build Pipeline
Is This Your Pipe? Hijacking the Build Pipeline $ whoami @rgbkrk OSS, Builds and Testing Protecting pipelines Need Want benefits of continuous delivery! Open source pathways to real, running infrastructure!
No.1 IT Online training institute from Hyderabad Email: [email protected] URL: sriramtechnologies.com
I. Basics 1. What is Application Server 2. The need for an Application Server 3. Java Application Solution Architecture 4. 3-tier architecture 5. Various commercial products in 3-tiers 6. The logic behind
EZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.8 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
IBM Endpoint Manager Version 9.2. Patch Management for SUSE Linux Enterprise User's Guide
IBM Endpoint Manager Version 9.2 Patch Management for SUSE Linux Enterprise User's Guide IBM Endpoint Manager Version 9.2 Patch Management for SUSE Linux Enterprise User's Guide Note Before using this
Taking Drupal development to the Cloud. Karel Bemelmans
Taking Drupal development to the Cloud Karel Bemelmans About me Working with Internet based services since 1996 Working with Drupal since 2011 Currently the devops guy @ Nascom Case Study: Nascom Genk,
Extending Remote Desktop for Large Installations. Distributed Package Installs
Extending Remote Desktop for Large Installations This article describes four ways Remote Desktop can be extended for large installations. The four ways are: Distributed Package Installs, List Sharing,
Fuse ESB Enterprise Installation Guide
Fuse ESB Enterprise Installation Guide Version 7.1 December 2012 Integration Everywhere Installation Guide Version 7.1 Updated: 08 Jan 2014 Copyright 2012 Red Hat, Inc. and/or its affiliates. Trademark
Deploying Foreman in Enterprise Environments 2.0. best practices and lessons learned. Nils Domrose Cologne, August, 4 2014
Deploying Foreman in Enterprise Environments 2.0 best practices and lessons learned Nils Domrose Cologne, August, 4 2014 About me senior linux systems engineer at inovex GmbH worked as a network engineer,
The Defense RESTs: Automation and APIs for Improving Security
The Defense RESTs: Automation and APIs for Improving Security Want to get better at security? Improve your operations and your development practices. The key is to centralize management, automate and test.
Putting It All Together. Vagrant Drush Version Control
Putting It All Together Vagrant Drush Version Control Vagrant Most Drupal developers now work on OSX. The Vagarant provisioning scripts may not work on Windows without subtle changes. If supplied, read
Oracle Database Cloud Services OGh DBA & Middleware Day
Oracle Database Cloud Services OGh DBA & Middleware Day Jan van Tiggelen Principal Sales Consultant Oracle Core Technology June 4th, 2015 Safe Harbor Statement The following is intended to outline our
Apcera Architecture Overview WHITEPAPER OCT 2015
Apcera Architecture Overview WHITEPAR OCT 2015 WHITEPAR Apcera Architecture Overview Table of Contents Chapter 1: Introduction... 3 Chapter 2: Apcera Infrastructure Components A. Architecture... 5 B. Console...
Practical Load Balancing
Practical Load Balancing Ride the Performance Tiger Illtil Peter Membrey David Hows Eelco Plugge Apress8 Contents About the Authors About the Technical Reviewers Special Thanks to serverlove Acknowledgments
5 Mistakes to Avoid on Your Drupal Website
5 Mistakes to Avoid on Your Drupal Website Table of Contents Introduction.... 3 Architecture: Content.... 4 Architecture: Display... 5 Architecture: Site or Functionality.... 6 Security.... 8 Performance...
Source Control Systems
Source Control Systems SVN, Git, GitHub SoftUni Team Technical Trainers Software University http://softuni.bg Table of Contents 1. Software Configuration Management (SCM) 2. Version Control Systems: Philosophy
IBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
Lab 7 - Exploitation 1. NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy
Lab 7 - Exploitation 1 NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy Lab 7 - Exploitation 2 Item I. (What were you asked to do?) Metasploit Server Side Exploits Perform the exercises
How To Run A Hello World On Android 4.3.3 (Jdk) On A Microsoft Ds.Io (Windows) Or Android 2.7.3 Or Android 3.5.3 On A Pc Or Android 4 (
Developing Android applications in Windows Below you will find information about the components needed for developing Android applications and other (optional) software needed to connect to the institution
Configuring MailArchiva with Insight Server
Copyright 2009 Bynari Inc., All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any
Timofey Turenko. Kirill Krinkin St-Petersburg Electrotechnical University
11 th Central and Eastern European Software Engineering Conference in Russia - CEE-SECR 2015 October 22-24, Moscow Automatic tool for multi-configuration environment creation for database server and database
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
MassTransit 6.0 Enterprise Web Configuration for Macintosh OS 10.5 Server
MassTransit 6.0 Enterprise Web Configuration for Macintosh OS 10.5 Server November 6, 2008 Group Logic, Inc. 1100 North Glebe Road, Suite 800 Arlington, VA 22201 Phone: 703-528-1555 Fax: 703-528-3296 E-mail:
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Jenkins World Tour 2015 Santa Clara, CA, September 2-3
1 Jenkins World Tour 2015 Santa Clara, CA, September 2-3 Continuous Delivery with Container Ecosystem CAD @ Platform Equinix - Overview CAD Current Industry - Opportunities Monolithic to Micro Service
Automating Big Data Benchmarking for Different Architectures with ALOJA
www.bsc.es Jan 2016 Automating Big Data Benchmarking for Different Architectures with ALOJA Nicolas Poggi, Postdoc Researcher Agenda 1. Intro on Hadoop performance 1. Current scenario and problematic 2.
Dry Dock Documentation
Dry Dock Documentation Release 0.6.11 Taylor "Nekroze" Lawson December 19, 2014 Contents 1 Features 3 2 TODO 5 2.1 Contents:................................................. 5 2.2 Feedback.................................................
SECURITY TRENDS & VULNERABILITIES REVIEW 2015
SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall
Servers. Servers. NAT Public Subnet: 172.30.128.0/20. Internet Gateway. VPC Gateway VPC: 172.30.0.0/16
.0 Why Use the Cloud? REFERENCE MODEL Cloud Development April 0 Traditionally, deployments require applications to be bound to a particular infrastructure. This results in low utilization, diminished efficiency,
The Security of MDM systems. Hack In Paris 2013 Sebastien Andrivet
The Security of MDM systems Hack In Paris 2013 Sebastien Andrivet Who am I? Sebastien Andrivet Switzerland (Geneva) Specialized in security Mobiles (ios, Android) Forensic Developer C++, x86 and ARM (Cyberfeminist
JAMF Software Server Installation and Configuration Guide for Linux. Version 9.2
JAMF Software Server Installation and Configuration Guide for Linux Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide
Mac OS X Security Checklist:
Mac OS X Security Checklist: Implementing the Center for Internet Security Benchmark for OS X Recommendations for securing Mac OS X The Center for Internet Security (CIS) benchmark for OS X is widely regarded
Managing your Red Hat Enterprise Linux guests with RHN Satellite
Managing your Red Hat Enterprise Linux guests with RHN Satellite Matthew Davis, Level 1 Production Support Manager, Red Hat Brad Hinson, Sr. Support Engineer Lead System z, Red Hat Mark Spencer, Sr. Solutions
CHAPTER 1 - JAVA EE OVERVIEW FOR ADMINISTRATORS
CHAPTER 1 - JAVA EE OVERVIEW FOR ADMINISTRATORS Java EE Components Java EE Vendor Specifications Containers Java EE Blueprint Services JDBC Data Sources Java Naming and Directory Interface Java Message
v7.8.2 Release Notes for Websense Content Gateway
v7.8.2 Release Notes for Websense Content Gateway Topic 60086 Web Security Gateway and Gateway Anywhere 12-Mar-2014 These Release Notes are an introduction to Websense Content Gateway version 7.8.2. New
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
MongoDB Security Guide
MongoDB Security Guide Release 2.6.11 MongoDB, Inc. December 09, 2015 2 MongoDB, Inc. 2008-2015 This work is licensed under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 United States License
Oracle Fusion Middleware. 1 Oracle Team Productivity Center Server System Requirements. 2 Installing the Oracle Team Productivity Center Server
Oracle Fusion Middleware Installation Guide for Oracle Team Productivity Center Server 11g Release 2 (11.1.2.1.0) E17075-02 September 2011 This document provides information on: Section 1, "Oracle Team
JAVA IN THE CLOUD PAAS PLATFORM IN COMPARISON
JAVA IN THE CLOUD PAAS PLATFORM IN COMPARISON Eberhard Wolff Architecture and Technology Manager adesso AG, Germany 12.10. Agenda A Few Words About Cloud Java and IaaS PaaS Platform as a Service Google
