Archive for the ‘eBooks & Documentation’ Category

How to remove watermark in PDF

Here I will show you how is easy to remove a watermark from PDF file.

      This watermarks you can see many time in PDF eBooks which you can download from free Internet resources. Some Web site owners to keep trademark and make users to come back again – using a tricks as inserting website URL address into PDF document. Its really make some time annoying as you don’t want your copy of eBook will be looks like second hand but as original PDF from Publisher company.

Continue reading “How to remove watermark in PDF” »

SSL HeartBleed – how to fetch confidential information from web server

        SSL HeartBleed (CVE-2014-0160) – this is know security vulnerability bug in OpenSSL protocol of version 1.0.1 through 1.0.1f and 1.0.2-beta.

        A vulnerability in OpenSSL could allow a remote attacker to expose sensitive data, possibly including user authentication credentials and secret keys, through incorrect memory handling in the TLS heartbeat extension.

        I am not going to explain what this bug can do or how it present in protocol side of SSL. More detail about it you can find on official US Government web site US-CERT [ United states computer emergency readiness team ] and HeartBleed web site.

Continue reading “SSL HeartBleed – how to fetch confidential information from web server” »

Custom Roles Using RBAC in the Solaris OS

Role Based Access Control (RBAC) started shipping with the Solaris 8 release of Sun Microsystems’ UNIX operating system. It can now be found within the Solaris 8, 9, and 10 releases. Simply defined, RBAC is a security tool to allow any non-root users access to complete tasks, scripts, and so on, with superuser privileges. For example, you have a second-shift operator who has been tasked to reboot some servers. RBAC can be used to set up permissions for the operator to carry out this task, which normally requires superuser authority. This is done simply by first creating a user, or defining an existing user. Next, a role and profile are created, and the profile is assigned to the role. After the profile has been assigned to a valid role, the role is now assigned to the OS user. The profile will have associated with it the task or script that is required to be run.

Continue reading “Custom Roles Using RBAC in the Solaris OS” »