Latest Publications

Download Fedora 21 Final Beta CD / DVD / ISO / 32-Bit / x86_64

Hello All,

This Fedora 21 is nameless it means No Codename given, New Version of Fedora took too long, After 20 its almost a year when Fedora is releasing New Version that is Fedora 21.

Fedora 21 Final Beta now released and Available for Download, This Post contains links from where you can download Fedora 21.

Fedora Lovers excited about this release and for them I am posting Links which can helps you to download Fedora 21 Final Beta Easily.

Download Fedora 21 Final Beta

Download Fedora 21 Final Beta

Download Fedora 21 Final Beta from links below :-

Download Fedora 21 Final Beta Server ISO for 32-Bit ( i686 ) Hardware Click on this Link:-
http://download.fedoraproject.org/pub/fedora/linux/releases/test/21-Beta/Server/i386/iso/Fedora-Server-DVD-i386-21_Beta.iso

Download Fedora 21 Final Beta Server ISO for 64-Bit ( i686 ) Hardware Click on this Link:-
http://download.fedoraproject.org/pub/fedora/linux/releases/test/21-Beta/Server/x86_64/iso/Fedora-Server-DVD-x86_64-21_Beta.iso

Download Fedora 21 Final Beta Workstation CD ISO for 32-Bit ( i686 ) Hardware Click on this Link :-

http://download.fedoraproject.org/pub/fedora/linux/releases/test/21-Beta/Workstation/i386/iso/Fedora-Live-Workstation-i686-21_Beta-4.iso

Download Fedora 21 Final Beta Workstation CD ISO for 64-Bit ( x86_64 ) Hardware Click on this Links :-
http://download.fedoraproject.org/pub/fedora/linux/releases/test/21-Beta/Workstation/x86_64/iso/Fedora-Live-Workstation-x86_64-21_Beta-4.iso

Download Fedora 21 Final Beta Cloud Images :- http://fedoraproject.org/get-prerelease#cloud

More Spins You can Download at :- http://fedoraproject.org/en/get-spin-prerelease

If you like this then Please Click Google +1 Button and Show Your Support. Your Support will encourage me to write more articles.

Please Keep in Touch with Social Networking :- 

Facebook :- https://www.facebook.com/tejasbarot.official
Facebook Page :- https://www.facebook.com/AllLinuxUsersBlog
Twitter :- https://www.twitter.com/imtejasbarot
LinkedIn :- http://in.linkedin.com/in/imtejasbarot
Google+ :- http://google.com/+TejasBarot
BBM: PIN:C00464502

Enjoy Fedora 21  :) Enjoy Linux :) Enjoy Open Source :)

Content Protection by DMCA.com

Linux User Group – LUG on BBM – BlackBerry Messenger

Hello,

Today I am feeling great to share this news that I have started Linux User Group – LUG on BlackBerry Channel.

We can discuss Linux & Open Source related stuff using this channel, This channel will be used for Linux and Open Source related latest News, Updates, Problems, Bugs, Solutions.

We are trying to open a chat so you can discuss with various Linux Experts.

Subscribe to Linux User Group on BBM Channel Now:

Channel PIN:C00464502

You can barcode given below to Join / Subscribe to this group.

If you are not on BBM Download it now: http://us.blackberry.com/bbm.html
BlackBerry Channel

BlackBerry Channel

 

Please Keep in Touch with Social Networking :- 

Facebook :- https://www.facebook.com/tejasbarot.official
Facebook Page :- https://www.facebook.com/AllLinuxUsersBlog
Twitter :- https://www.twitter.com/imtejasbarot
LinkedIn :- http://in.linkedin.com/in/imtejasbarot
Google+ :- https://plus.google.com/+TejasBarot
BBM: PIN:C00464502

Content Protection by DMCA.com

Download Ubuntu 14.10 Utopic Unicorn Final ISO / CD / DVD / x86_64 / 32-Bit

Hello,

This post will contain links for Downloading Ubuntu 14.10 Utopic Unicorn Final.

I always Prefer New Releases of Ubuntu and Instantly Install it for Experience the New World of Ubuntu, Ubuntu is very fast to recognize and Fix the Bugs so even if you install it very early you will get bug fixes very quickly and that’s the reason I switch to Ubuntu from Fedora as Fedora is very Lazy in releases as well as Bug fixes and Even Resource Hungry too.

Once you download and use this Ubuntu 14.10 Utopic Unicorn then please do not forget to post comments on your experience.

Ubuntu 14.10 Utopic Unicorn

Ubuntu 14.10 Utopic Unicorn


Now Ubuntu 14.10 Utopic Unicorn Final is now available for download.

Ubuntu 14.10 Utopic Unicorn Final ISO is available for Download in 32-Bit (i386 ) and X86_64 ( 64-Bit) Versions.

You can go through this link and Download Ubuntu 14.10 Utopic Unicorn Final :-

Download Ubuntu 14.10 Utopic Unicorn Final 32-Bit ( i386) :- http://releases.ubuntu.com/14.10/ubuntu-14.10-desktop-i386.iso

Download Ubuntu 14.10 Utopic Unicorn Final x86_64 ( 64-Bit) :- http://releases.ubuntu.com/14.10/ubuntu-14.10-desktop-amd64.iso

Download Ubuntu 14.10 Utopic Unicorn Final Server Edition 32-Bit ( i386) :- http://releases.ubuntu.com/14.10/ubuntu-14.10-server-i386.iso

Download Ubuntu 14.10 Utopic Unicorn Final Server Edition X86_64 ( 64-Bit) :- http://releases.ubuntu.com/14.10/ubuntu-14.10-server-amd64.iso

If you like this then Please Click Google +1 Button and Show Your Support. Your Support will encourage me to write more articles.

Please Keep in Touch with Social Networking :- 

Facebook :- https://www.facebook.com/tejasbarot.official
Facebook Page :- https://www.facebook.com/AllLinuxUsersBlog
Twitter :- https://www.twitter.com/imtejasbarot
LinkedIn :- http://in.linkedin.com/in/imtejasbarot
Google+ :- https://plus.google.com/+TejasBarot

Content Protection by DMCA.com

ShellShock Bug: Check / Identify / Solve Vulnerability

Hello,

Patch your bash now Just heard that your shell / bash may be vulnerable or buggy.

This post will help you to check whether your Shell / bash of Red Hat Enterprise Linux is vulnerable / Bug infected or not.

How does this impact systems

This issue affects all products which use the Bash shell and parse values of environment variables. This issue is especially dangerous as there are many possible ways Bash can be called by an application. Quite often if an application executes another binary, Bash is invoked to accomplish this. Because of the pervasive use of the Bash shell, this issue is quite serious and should be treated as such.

All versions prior to those listed as updates for this issue are vulnerable to some degree.

See the appropriate remediation article for specifics.

The patch for CVE-2014-7169 introduces changes to how Bash evaluates environment variables. Applications which directly create Bash functions as environment variables need to be made aware of these changes. Previously, a function had to be stored in an environment variable of the same name. For example, the function “compute” would be stored in an environment variable named “compute”. With the patch for CVE-2014-7169 applied, it would need to use the name “BASH_FUNC_compute()”. As a result, there are now two pairs of parentheses in the environment string, as in “BASH_FUNC_compute()=() { }”.

Functions written in Bash itself do not need to be changed, even if they are exported with “export -f”. Bash will transparently apply the appropriate naming when exporting, and reverse the process when importing function definitions.

 

ShellShock

ShellShock

Execute following command to check whether your bash / shell is bug infected or vulnerable!

So, how do you know if your servers can be attacked? First, you need to check to see if you’re running a vulnerable version of Bash. To do that, run the following command from a Bash shell:

env x='() { :;}; echo vulnerable' bash -c "echo this is a test"

If you get the result:

vulnerable
this is a test

Bad news, your version of Bash can be hacked. If you see:

bash: warning: x: ignoring function definition attempt bash: error importing function definition for `x’ this is a test

You’re good. Well, to be more exact, you’re as protected as you can be at the moment.

OR

To test if your version of Bash is vulnerable to CVE-2014-6271, run the following command:

$ env 'x=() { :;}; echo vulnerable' 'BASH_FUNC_x()=() { :;}; echo vulnerable' bash -c "echo test"

If the output of the above command contains a line containing only the word vulnerable you are using a vulnerable version of Bash. The patch used to fix this issue ensures that no code is allowed after the end of a Bash function.

Note that different Bash versions will also print different warnings while executing the above command. The Bash versions without any fix produce the following output:

$ env 'x=() { :;}; echo vulnerable' 'BASH_FUNC_x()=() { :;}; echo vulnerable' bash -c "echo test"
vulnerable
bash: BASH_FUNC_x(): line 0: syntax error near unexpected token `)'
bash: BASH_FUNC_x(): line 0: `BASH_FUNC_x() () { :;}; echo vulnerable'
bash: error importing function definition for `BASH_FUNC_x'
test

The versions with only the original CVE-2014-6271 fix applied produce the following output:

$ env 'x=() { :;}; echo vulnerable' 'BASH_FUNC_x()=() { :;}; echo vulnerable' bash -c "echo test"
bash: warning: x: ignoring function definition attempt
bash: error importing function definition for `x'
bash: error importing function definition for `BASH_FUNC_x()'
test

Read more :- https://access.redhat.com/articles/1200223

Products Affected:

Product/Channel Fixed in package Remediation details
Red Hat Enterprise Linux 7 bash-4.2.45-5.el7_0.4 Red Hat Enterprise Linux
Red Hat Enterprise Linux 6 bash-4.1.2-15.el6_5.2 Red Hat Enterprise Linux
bash-4.1.2-15.el6_5.1.sjis.1 * Red Hat Enterprise Linux
bash-4.1.2-9.el6_2.1 * Red Hat Enterprise Linux 6.2 AUS
bash-4.1.2-15.el6_4.1 * Red Hat Enterprise Linux 6.4 EUS
Red Hat Enterprise Linux 5 bash-3.2-33.el5_11.4 Red Hat Enterprise Linux
bash-3.2-33.el5_11.1.sjis.1 * Red Hat Enterprise Linux
bash-3.2-24.el5_6.1 * Red Hat Enterprise Linux 5.6 LL
bash-3.2-32.el5_9.2 * Red Hat Enterprise Linux 5.9 EUS
Red Hat Enterprise Linux 4 bash-3.0-27.el4.2 * Red Hat Enterprise Linux 4 ELS

If you are using any other version of Linux, Check and Patch it now before its too late!!

References taken from :

https://access.redhat.com/announcements/1210053
https://access.redhat.com/security/cve/CVE-2014-6271
Resolution: https://access.redhat.com/node/1207723

Be Safe :) Be Secure :) Enjoy Linux :) Enjoy Open Source

Please Keep in Touch with Social Networking :- 

Facebook :- https://www.facebook.com/tejasbarot.official
Facebook Page :- https://www.facebook.com/AllLinuxUsersBlog
Twitter :- https://www.twitter.com/imtejasbarot
LinkedIn :- http://in.linkedin.com/in/imtejasbarot
Google+ :- https://plus.google.com/+TejasBarot

Content Protection by DMCA.com

MySQL: Drop all tables from Database using Script / Linux

Hello,

Few days back, I got a task to do, Task was Keep the database as it is, So that we do not have to add database users, privileges and everything again and again, Just Drop all the databases tables inside the database. If there are only few tables like 5 or 10 than it is easy to do it manually, but what if you have the 100s or 1000s of tables inside database ?

I was in same situation, there were more than 500 tables and  I need to drop it quickly as it was production server, So for the same I managed to do it easily by using few command line parameters and loop, After that I have created script for the same which helps me to drop those tables very easily, You don’t have to worry about each and every table, It will keep database as it is but will drop all the tables from the selected database.

I am sharing that script and steps how to use that script, Would request you to test on non production environment first, Wherever you are executing this script its totally on your risk.

MySQL Script

MySQL Script

 

SUGGESTION: Take a Backup of your database / tables / MySQL Before executing Script, So if anything goes wrong you can also recover.

Steps to execute script :-

1. Download Script

tejas-barot@linux-ahmedabad:~$ wget tejasbarot.com/Scripts/dropall_mysql_tables.sh

2. Give executable permissions

tejas-barot@linux-ahmedabad:~$ chmod +x dropall_mysql_tables.sh

3. Now Let’s execute Script

tejas-barot@linux-ahmedabad:~$ ./dropall_mysql_tables.sh

4. Provide name of the MySQL database from which you want to drop all the tables.

Enter Database name:                         <—- Provide Database name here
Enter MySQL root Password:          
<—- Provide root password of MySQL Here

5. Script will take a Full database backup into /tmp, but I would request don’t depend on this, before executing script take backup.

6. That’s it wait for few minutes, It will drop all the tables from MySQL Database.

Enjoy MySQL :-) Enjoy Linux :) Enjoy Open Source :)

Please Keep in Touch with Social Networking :- 

Facebook :- https://www.facebook.com/tejasbarot.official
Facebook Page :- https://www.facebook.com/AllLinuxUsersBlog
Twitter :- https://www.twitter.com/imtejasbarot
LinkedIn :- http://in.linkedin.com/in/imtejasbarot
Google+ :- https://plus.google.com/+TejasBarot

Content Protection by DMCA.com

RHEL 7 / CentOS 7 / Grub2 : Protect Single User Mode / Rescue / Emergency with Password

Hello All,

As we all know Red Hat Enterprise Linux 7 and CentOS 7 Linux is out now, Recently I have posted How to enter into Single User Mode / Rescue / Emergency Mode on RHEL 7 / CentOS 7.

This post is to Secure Single User Mode / Rescue Mode / Emergency mode on RHEL 7 / CentOS 7 in Grub2, By performing this Article you will able to secure your Grub2 Edits with Username and Password, It is always a good idea to protect your Grub2.

In This Howto, We will protect Grub2 with Encrypted Password and Plain Password.

To Follow this how to make sure you have root password to make changes in Grub2, Please make sure you are doing exact as per instructions and going through notes.

Do this on your own risk, You will be the only responsible if anything goes wrong in any case :)

 

CentOS7_Grub2

CentOS7_Grub2

 

Protect Grub2 with Plain Password Method

1. Login as a root user or user with rights to edit grub2 configuration file (sudo).

[tejas-barot@rhel-centos7-tejas-barot-linux ~]$ su -

2. Make a backup of existing grub.cfg and default /etc/grub.d/10_linux so if anything goes wrong we can always restore it.

[root@rhel-centos7-tejas-barot-linux ~]# cp /boot/grub2/grub.cfg /boot/grub2/grub.cfg.orig
[root@rhel-centos7-tejas-barot-linux ~]# cp /etc/grub.d/10_linux /etc/grub.d/10_linux.orig

3. Now, Adding Entries to protect Grub2 with username and password:

Note1: Replace Username and Password from below lines and Add below lines at last in file /etc/grub.d/10_linux

Note2: Make sure you don’t insert following entries multiple time.

[root@rhel-centos7-tejas-barot-linux ~]# vi /etc/grub.d/10_linux
cat << EOF
set superusers="tejasbarot" password tejasbarot alub@123
EOF

4. Now let us Generate New grub.cfg, Execute following command.

[root@rhel-centos7-tejas-barot-linux ~]# grub2-mkconfig --output=/tmp/grub2.cfg

5. Now Replace this New configured grub2.cfg with existing grub2.cfg

[root@rhel-centos7-tejas-barot-linux ~]# mv /boot/grub2/grub.cfg /boot/grub2/grub.cfg.move
[root@rhel-centos7-tejas-barot-linux ~]# mv /tmp/grub2.cfg /boot/grub2/grub.cfg

6. That’s It, Now You can reboot and Press “e” on Grub Menu, It will ask you for the password.

Protect Grub2 with Password Encrypted Method

1. Login as a root user or user with rights to edit grub2 configuration file (sudo).

[tejas-barot@rhel-centos7-tejas-barot-linux ~]$ su -

2. Make a backup of existing grub.cfg and default /etc/grub.d/10_linux so if anything goes wrong we can always restore it.

[root@rhel-centos7-tejas-barot-linux ~]# cp /boot/grub2/grub.cfg /boot/grub2/grub.cfg.orig
[root@rhel-centos7-tejas-barot-linux ~]# cp /etc/grub.d/10_linux /etc/grub.d/10_linux.orig

3. Let’s Generate Encrypted password with “grub2-mkpasswd-pbkdf2″, Once you will execute below command it will ask you for the password, Please enter password twice, It will generate password string which you need to add to 10_linux file. ( Shortened version of string, You will have to paste complete string )

[root@rhel-centos7-tejas-barot-linux ~]# grub2-mkpasswd-pbkdf2
Enter Password:
Reenter Password:
PBKDF2 hash of your password is grub.pbkdf2.sha512.10000.F1C4CFAA5A51EED123BE8238C23B25B2A6909AFC9812F0D45

4. Now, Adding Entries to protect Grub2 with username and password:

Note1: Replace Username and Password from below lines and Add below lines at last in file /etc/grub.d/10_linux

Note2: Make sure you don’t insert following entries multiple time.

Note3: Here I have added Short String for example, you will have to add full string to make it work.

[root@rhel-centos7-tejas-barot-linux ~]# vi /etc/grub.d/10_linux
cat << EOF
set superusers="tejasbarot" password_pbkdf2 tejasbarot grub.pbkdf2.sha512.10000.F1C4CFAA5A51EED123BE8238C23B25B2A6909AFC9812F0D45
EOF

5. Now let us Generate New grub.cfg, Execute following command.

[root@rhel-centos7-tejas-barot-linux ~]# grub2-mkconfig --output=/tmp/grub2.cfg

6. Now Replace this New configured grub2.cfg with existing grub2.cfg

[root@rhel-centos7-tejas-barot-linux ~]# mv /boot/grub2/grub.cfg /boot/grub2/grub.cfg.move
[root@rhel-centos7-tejas-barot-linux ~]# mv /tmp/grub2.cfg /boot/grub2/grub.cfg

7. That’s It, Now You can reboot and Press “e” on Grub Menu, It will ask you for the password.

Enjoy Protected Grub2 :) Enjoy CentOS 7 :) Enjoy RHEL 7 :) Enjoy Linux :) Enjoy Open Source :)

Please Keep in Touch with Social Networking :- 

Facebook :- https://www.facebook.com/tejasbarot.official
Facebook Page :- https://www.facebook.com/AllLinuxUsersBlog
Twitter :- https://www.twitter.com/imtejasbarot
LinkedIn :- http://in.linkedin.com/in/imtejasbarot
Google+ :- https://plus.google.com/+TejasBarot

Content Protection by DMCA.com

[Solved] Skype 4.2.x Linux : Can’t Connect | Ubuntu 12.04 / Ubuntu 14.04 LTS

Hello All,

Today Morning, I started my Laptop and Logged in to My Ubuntu 14.04.1 LTS box and tried to Login in to Skype with same credentials, Skype thrown Error was “Can’t Connect”.

I managed to solve this error so sharing this error’s solution which might helps you.

This Error’s solution is very simple but very weird and complicated to find it out, I have find it out by just guessing the things.

skype 4.3 for Linux

skype 4.3 for Linux

I Just went to Skype’s Website and Checked that Latest Version was there so I gave it try and Updated New Version, After updating version of Skype, I am able to login successfully without any problem.

Get the Latest Version of Skype 4.3 For Linux from here http://www.skype.com/en/download-skype/skype-for-computer/

and Install it by using following Command :-

tejas-barot@skype-ubunt-14-04-lts:~$ sudo dpkg -i skype-xxx-xx.deb

I was using Skype’s Version 4.2.x for Linux, I have updated version to 4.3.0.37 and this solved my problem.

This is very simple Solution to the problem but very weird to find it out so Sharing with you guys.

Enjoy Skype Calls :) Enjoy Ubuntu :) Enjoy Linux :) Enjoy Open Source :)

Please Keep in Touch with Social Networking :- 

Facebook :- https://www.facebook.com/tejasbarot.official
Facebook Page :- https://www.facebook.com/AllLinuxUsersBlog
Twitter :- https://www.twitter.com/imtejasbarot
LinkedIn :- http://in.linkedin.com/in/imtejasbarot
Google+ :- https://plus.google.com/+TejasBarot

Content Protection by DMCA.com

RHEL 7 / CentOS 7 : Single User Mode / Recovering / Reset Root Password

Hello,
Setting up the root password is a mandatory part of the Red Hat Enterprise Linux 7 / CentOS 7installation.
If you forget or lose your password, it is possible to reset it. Now it is known as Rescue Mode / Emergency mode in CentOS / RHEL 7, Previously in RHEL / CentOS 5/6 It was “Single User Mode”.
Note: In GRUB 2, resetting the password is no longer performed in single-user mode as it was in GRUB included in Red Hat Enterprise Linux 6. The root password is now required to operate in single-user mode as well as in emergency mode.
systemd_recover_root_password

systemd_recover_root_password

Process: Resetting the Root Password
  1. Please follow this procedure carefully, any mistake can make your system / Linux unstable, Perform this own your on risk.
    q
  2. Start the system and, on the GRUB 2 boot screen, press the e key for edit.
  3. Add the following parameter at the end of the linux line, or linuxefi on UEFI systems (In case of  VMWare like KVM or VirtualBox use rb.break instead of init=/bin/sh):
    init=/bin/sh
    The Linux kernel will run the /bin/sh shell rather than the system init daemon. Therefore, some functions may be limited or missing.

    Important

    The rhgb and quiet parameters must be disables in order to enable system messages.
  4. Press Ctrl+x to boot the system with the parameter.
    The shell prompt appears.
  5. The file system is mounted read-only. You will not be allowed to change the password if the file system is not writable.
    To remount the file system as writable, run the mount -o remount, rw / command.
  6. Run the passwd command and follow the instructions displayed on the command line to change the root password.
    Note that if the system is not writable, the passwd tool fails with the following error:
    Authentication token manipulation error
  7. To make sure that SELinux context of the files that were modified is restored properly after boot, run
    touch /.autorelabel
  8. Run the exec /sbin/init command to resume the initialization and finish the system boot.
    Running the exec command with another command specified replaces the shell and creates a new process; init in this case.
    Alternatively, if you wish to reboot the system, run the exec /sbin/reboot command instead.

Enjoy RHEL 7 :) Enjoy CentOS 7 :) Enjoy Linux :) Enjoy Open Source :)

Please Keep in Touch with Social Networking :- 

Facebook :- https://www.facebook.com/tejasbarot.official
Facebook Page :- https://www.facebook.com/AllLinuxUsersBlog
Twitter :- https://www.twitter.com/imtejasbarot
LinkedIn :- http://in.linkedin.com/in/imtejasbarot
Google+ :- https://plus.google.com/+TejasBarot

Content Protection by DMCA.com