CentOS 5.9 – remove php 5.1 and install 5.2 / 5.3

 

Centos 5.9 coming with php 5.1 and we really need to update

 

remove 5.1 using

 

# yum remove php php*

Installing PHP 5.2  / 5.3

Atomic repository (recommended)
The most convenient means is to use the Atomic repository. CentOS guru recommend that you use it instead of CentOS-Testing due to unstable test software.
Connect the repository:
wget -q -O – http://www.atomicorp.com/installers/atomic.sh | sh
Disable PHP 5.3 that is installed into the repository by default (SKIP THIS STEP IF YOU WANT TO INSTALL 5.3)
exclude = php*5.3*                   –  into [atomic] in the  vi /etc/yum.repos.d/atomic.repo file

Update PHP
yum install php php-mysql php-cgi

 

Once completed successfully, check PHP and its version:
php -v
php -m
Restart Apache
/etc/init.d/httpd restart

 

HTML 5 Web code weakness allows data dump on computers

The loophole exploits a feature of HTML 5 which defines how websites are made and what they can do.

Developer Feross Aboukhadijeh found the bug and set up a demo page that fills visitors’ hard drives with pictures of cartoon cats.

In one demo, Mr Aboukhadijeh managed to dump one gigabyte of data every 16 seconds onto a vulnerable Macbook.

Clever code

Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug, said Mr Aboukhadijeh.

While most websites are currently built using version 4 of the Hyper Text Markup Language (HTML), that code is gradually being superseded by the newer version 5.

One big change brought in with HTML 5 lets websites store more data locally on visitors’ PCs. Safeguards built into the “local storage” specification should limit how much data can be stored. Different browsers allow different limits but all allow at least 2.5 megabytes to be stored.

However, Mr Aboukhadijeh found a way round this cap by creating lots of temporary websites linked to the one a person actually visited. He found that each one of these associated sites was allowed to store up to the limit of data because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs.

Only Mozilla’s Firefox capped storage at 5MB and was not vulnerable, he found.

“Cleverly coded websites have effectively unlimited storage space on visitor’s computers,” wrote Mr Aboukhadijeh in a blogpost about the bug.

Code to exploit the bug has been released by Mr Aboukhadijeh and he set up a website, called Filldisk that, on vulnerable PCs, dumps lots of images of cats on to the hard drive. So far, no malicious use of the exploits has been observed.

In a bid to solve the problem, bug reports about the exploit have been filed with major browser makers.

 

courtesy: http://www.bbc.co.uk/news/technology-21628622

Install VPN Server with PPTP on CentOS, RedHat and Ubuntu

Step 1. Install PPTPD

If your OS is CentOS/RedHat 5:

yum install ppp
cd /usr/local/src
wget http://poptop.sourceforge.net/yum/stable/packages/pptpd-1.3.4-2.rhel5.x86_64.rpm
rpm -Uhv pptpd-1.3.4-2.rhel5.x86_64.rpm

If your OS is CentOS/RedHat 6:

yum install ppp
cd /usr/local/src
wget http://poptop.sourceforge.net/yum/stable/packages/pptpd-1.3.4-2.el6.x86_64.rpm
rpm -Uhv pptpd-1.3.4-2.el6.x86_64.rpm

If you are using Ubuntu:

apt-get install pptpd

Step 2. Edit IP setttings in /etc/pptpd.conf

vi /etc/pptpd.conf

localip 192.168.0.1
remoteip 192.168.0.101-200

Step 3. Add user account in/etc/ppp/chap-secrets (assign username and password)

vi /etc/ppp/chap-secrets

usernameForuser1 *  setpassword1here  *

usernameForuser2 *  setpassword2here  *

Step 4. Optional settings in /etc/ppp/options.pptpd

vi /etc/ppp/options.pptpd

ms-dns 8.8.8.8
ms-dns 4.4.4.4

Step 5. Enable network forwarding in /etc/sysctl.conf
vi /etc/sysctl.conf

net.ipv4.ip_forward = 1

use the following command to apply the change:

sysctl -p

Step 6. Configure firewall

iptables -A INPUT -i eth0 -p tcp --dport 1723 -j ACCEPT
iptables -A INPUT -i eth0 -p gre -j ACCEPT
iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
iptables -A FORWARD -i ppp+ -o eth0 -j ACCEPT
iptables -A FORWARD -i eth0 -o ppp+ -j ACCEPT
service iptables save
service iptables restart
If you are using CSF firewall, you may refer to this post on firewall settings.

Step 7. Start PPTP VPN server

If your OS is CentOS or Redhat, using the following command:

service pptpd restart

To start PPTP Daemon automatically when rebooting next time, use command:

chkconfig pptpd on


If your OS is Ubuntu, you just reboot your machine.

 

kama sutra download pdf – an ancient handbook of love making

Download PDF – Kama Sutra

The Kama Sutra (Sanskrit: कामसूत्र  pronunciation (help·info), Kāmasūtra) is an ancient Indian Hindu[1][2] text widely considered to be the standard work on human sexual behavior in Sanskrit literature written by Vātsyāyana. A portion of the work consists of practical advice on sexual intercourse.[3] It is largely in prose, with many inserted anustubh poetry verses. “Kāma” which is one of the four goals of Hindu life, means sensual or sexual pleasure, and “sūtra” literally means a thread or line that holds things together, and more metaphorically refers to an aphorism (or line, rule, formula), or a collection of such aphorisms in the form of a manual. Contrary to popular perception, especially in the western world, Kama sutra is not just an exclusive sex manual; it presents itself as a guide to a virtuous and gracious living that discusses the nature of love, family life and other aspects pertaining to pleasure oriented faculties of human life.[4][5]

WP Twitter Auto Publish Powered By : XYZScripts.com