Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Resetting a forgotten MySQL root password


Resetting a forgotten MySQL root password

Post date: October 2, 2006, 09:10 Category: Security Views: 4583 Comments
Tutorial quote: Resetting the root password of a MySQL database is trivial if you know the current password if you don't it is a little tricker. Thankfully it isn't too difficult to fix, and here we'll show one possible way of doing so.

Restoring a lost root password

Post date: August 26, 2005, 18:08 Category: System Views: 3203 Comments
Tutorial quote: For some reason you have forgotten your root password
After you stopped banging your head against the wall, this is how you can fix it.

Reset MySQL password in FreeBSD

Post date: June 2, 2008, 12:06 Category: Software Views: 6172 Comments
Tutorial quote: Step by step howto for resetting MySQL password in FreeBSD 7 and MySQL 5.051a port.

System encryption on Debian Etch

Post date: August 16, 2006, 16:08 Category: Security Views: 4984 Comments
Tutorial quote: In this article I will describe how to setup a nearly complete encrypted system using Debian Etch and cryptsetup with LUKS. The goal is: encrypt all partitions except /boot. The user should enter a password at boot time or provide a keyfile on an USB device to decrypt the root partition. Keyfiles for additional partitions are located on the root, so the user does not need to enter a password for every partition.

Password-Protect Directories With mod_auth_mysql On Apache2 (Debian Squeeze)

Post date: November 15, 2011, 10:11 Category: Miscellaneous Views: 29771 Comments
Tutorial quote: This guide explains how to password-protect web directories (with users from a MySQL database) with mod_auth_mysql on Apache2 on a Debian Squeeze server. It is an alternative to the plain-text password files provided by mod_auth and allows you to use normal SQL syntax to create/modify delete users. You can also configure mod_auth_mysql to authenticate against an existing MySQL user table.

How to scan your Linux-Distro for Root Kits

Post date: May 19, 2006, 18:05 Category: Security Views: 3173 Comments
Tutorial quote: Do you suspect that you have a compromised system ?
Check now for root kits that the intruder may have installed !!!

So... What in the hell is a root kit ???
A root kit is a collection of programs that intruders often install after they have compromised the root account of a system.
These programs will help the intruders clean up their tracks, as well as provide access back into the system.
Root kits will sometimes leave processes running so that the intruder can come back easily and without the system administrator's knowledge !

Scripts like chkrootkit will do the job for you automatically.

Install and Configure Auth Shadow on Debian/Ubuntu

Post date: February 23, 2007, 18:02 Category: Miscellaneous Views: 3633 Comments
Tutorial quote: Auth Shadow or mod-auth-shadow is a module for apache (and apache2, sort of) that enables authentication against /etc/shadow. The benefits being that any system user with a password can be authenticated for web_dav, subversion or simply an https server. The only other way to do this is with PAM. That method is dangerous because the apache user (www-data in my case) must be able to read /etc/shadow. Obviously, not a good idea. Auth Shadow accomplishes this safely by using a intermediate program called validate. This works because validate can be owned by root but executable by everyone. In the event that your server is compromised through apache, your password file will not be readable.

Making a DVD from CDs

Post date: December 4, 2005, 16:12 Category: Installing Views: 3524 Comments
Tutorial quote: People have requested to have a single DVD instead of the 5 CD's. The reasons for this are various. I have written a program called makeSUSEdvd that can make the DVD in a very easy manner. First download the CD's. These can be either the NOVELL SUSE CD's or the openSUSE cd's. You do not need to burn them, just put them in one directory with only the 5 CD's in it. You will need the root password. If you do not have that, the program is not good and you should do it by hand.

sshpass - Non-interactive ssh password authentication

Post date: May 4, 2008, 22:05 Category: Security Views: 5676 Comments
Tutorial quote: SSH’s (secure shell) most common authentication mode is called “interactive keyboard password authentication”, so called both because it is typically done via keyboard, and because openssh takes active measures to make sure that the password is, indeed, typed interactively by the keyboard.

Sometimes, however, it is necessary to fool ssh into accepting an interactive password non-interactively. This is where sshpass comes in.

Sudo FAQ

Post date: February 26, 2007, 21:02 Category: Security Views: 4191 Comments
Tutorial quote: Sudo is a simple program which allows the administrator to give regular users extra permissions to execute the commands they would normally not be allowed to use. Thanks to sudo, we can execute commands that are usually restricted to the root account. In practice, it looks like that: instead of typing su ->password -> command you type sudo command. In order to use sudo you need to configure it properly. This FAQ is supposed to help you with this task.
Web-based applications and online marketing solutions - LumoLink