Archive for the ‘Egyéb’ Category

I am a Red Hat® Certified System Administrator (RHCSA), and I am able to perform the following tasks:

 

  • Understand and use essential tools for handling files, directories, command-line environments, and documentation
  • Create simple shell scripts
  • Operate running systems, including booting into different run levels, identifying processes, starting and stopping virtual machines, and controlling services
  • Configure local storage using partitions and logical volumes
  • Create and configure file systems and file system attributes, such as permissions, encryption, access control lists, and network file systems
  • Deploy, configure, and maintain systems, including software installation, update, and core services
  • Manage users and groups
  • Manage security, including basic firewall and SELinux configuration
  • Perform basic container management

 

Get immediate verification of my Red Hat certificate by entering the certificate number (210-116-455) below.

https://rhtapps.redhat.com/verify?certId=210-116-455

My RHCSA certification is valid until Nov 12, 2024 according to RedHat.

 

I am offering you my Ansible automation experiences (See below.)

I am able to perform all tasks expected of a Red Hat Certified System Administrator

  • Understand and use essential tools
  • Operate running systems
  • Configure local storage
  • Create and configure file systems
  • Deploy, configure, and maintain systems
  • Manage users and groups
  • Manage security

Understand core components of Ansible

  • Inventories
  • Modules
  • Variables
  • Facts
  • Plays
  • Playbooks
  • Configuration files
  • Use provided documentation to look up specific information about Ansible modules and commands

Install and configure an Ansible control node

  • Install required packages
  • Create a static host inventory file
  • Create a configuration file
  • Create and use static inventories to define groups of hosts
  • Manage parallelism

Configure Ansible managed nodes

  • Create and distribute SSH keys to managed nodes
  • Configure privilege escalation on managed nodes
  • Validate a working configuration using ad hoc Ansible commands

Script administration tasks

  • Create simple shell scripts
  • Create simple shell scripts that run ad hoc Ansible commands

Create Ansible plays and playbooks

  • Know how to work with commonly used Ansible modules
  • Use variables to retrieve the results of running a command
  • Use conditionals to control play execution
  • Configure error handling
  • Create playbooks to configure systems to a specified state

Use Ansible modules for system administration tasks that work with:

  • Software packages and repositories
  • Services
  • Firewall rules
  • File systems
  • Storage devices
  • File content
  • Archiving
  • Scheduled tasks
  • Security
  • Users and groups

Work with roles

  • Create roles
  • Download roles from an Ansible Galaxy and use them

Use advanced Ansible features

  • Create and use templates to create customized configuration files
  • Use Ansible Vault in playbooks to protect sensitive data

As with all Red Hat performance-based exams, configurations must persist after reboot without intervention.

You will find at the following link WR842ND TP-Link router WiFi OpenWrt firmware:
https://downloads.openwrt.org/snapshots/trunk/ar71xx/generic/

Adminfelülethez on the Web, you must first upgrade to the kamikaze, and then install the uhttpd and luci.

And then turn on the router and telnet to change the root password, then exit from exit and this will stop the telnet server and putty as root via entering the following commands:

opkg udpate kamikaze
and then:
opkg install uhttpd
Finally:
opkg install luci

other useful infól for beginners:
Installing OpenWrt (General) [OpenWrt Wiki]
First login [OpenWrt Wiki]

Figyelem!
A esetenként én visszafejteni altemplom fontos fájljairól.

(Frissítve: 23, a 2015. június)

Hívj a részleteket. + 3630-414-3802


Cryptolocker bemutató 13 május 2014 (Magyar)

CryptoLocker az előadás teljes szövege (angol)

Fresh Information!!
In some cases it is possible to CryptoLo
cker and CTB Locker "blackmailing virus" (another variant detected in July, 2014) by restoring original encryption!

(Updated 23 June 2015)

Call for details! 0630-414-38.02


CryptoLocker from "blackmailing virus"

  This article primarily describes the functionality of CryptoLocker malware program infection control and try to help, but is useful for other, not so drastic results that protect against computer kártevőprogram.

 

The CryptoLocker demonstration

  The first CryptoLocker in September 2013, the detection of ransomware. Microsoft operating systems (Windows XP, 7, 8, 8.1) can damage computer systems, on the other platform (Apple, Linux, etc …) are not at risk. After the poisoning of the victim's computer background (RSA. asymmetrical double-key) encryption algorithms, public ("public key") key to encrypt personal files on your computer "to" (Word, Excel, PowerPoint, image and video files, etc. ..). Finally the ransomware a pop-up (in English) provides information about how to encrypt documents on your computer and the recovery money is absolutely necessary-a unique secret key (the ' private key '). The popup appears to the left of a counter, which counts backwards from 72 to zero, which is the deadline for the remaining váltságdíjfizetés the remaining correspond to the current time. According to the 72-hour the threat after the expiry of the time limit szerverükről encrypted "personal files" required to recover unique "private key" and this information will be lost forever. CryptoLocker depending on the version (is) payable to "ransom" 100-600 USD or EUR, which also depends on how much time you have left until the end of the period (the time, the greater amount of credit). Unfortunately, the current information technology this is the RSA encryption up to 2048/4096bites (military/Bank "strength") does not break up, so the data is irreplaceable for whom infection and want to restore them, forced to pay a "ransom" and believe that you can then send the extortioners decrypting unique secret key.
  According to the us Internet sites also police was forced to pay hundreds of $ ransom because there was no save the date dokumentumaikról.
  It happened that an administrator connected to the infected computer into revealing the only data backup with external HDD and so the data it contained also became unusable, because the CryptoLocker encrypt these files.


Sources of infection may include:

-Email: CryptoLocker spamekhez the first versions of zip files attached mainly, now very believable, counterfeit e-mail messages.

Web pages: "offensive"-websites, torrent, warez sites, download files, run "adult" content sites you visit (or websites) that an attacker could execute code that the infection takes advantage of the operating system and/or Web browser-security vulnerabilities.

-Mobile data storage devices: Infected memory sticks, memory cards, external hard drive, etc. ..


Fresh Information!!
In some cases, there is a possibility for th
e CryptoLocker, CrypXXX, Locker CTB "blackmailing virus" by encryption before restoring (original)!

(Updated: 2016. May 23.)

Call for details! 0630-414-38.02


For more details on the following pdf protection options.

CryptoLocker from "blackmailing virus" in my article in Hungarian (2015)

Cryptolocker presentation (13th of May 2014, English)

CryptoLocker presentation text (13th of May 2014, English)