Operating systems, Security SELinux for beginners 07.09.2020 by Open source Team Do you know the following situation: You are following a step by step tutorial on the web and on your environment does not work as expected because of SELinux. Your looking on search engines command how you can disable the(…)
Database Administration & Monitoring, Database management, MySQL, Security The evolution of MySQL authentication mechanism 08.05.2020 by Elisa Usai The authentication, the first level of security for each IT system, is the stage to verify the user identity through the basic username and password scheme. It is crucial to have a mechanism to protect and secure password storing and(…)
Operating systems, Security, Technology Survey Recover data from Azure backup 05.05.2020 by Stéphane Savorgnano During my last blog-post I experienced to use Azure backup to protect an on-premise Windows server. To recover data from Azure backup we need to use the Microsoft Azure Recovery Services console (MARS). This service and its management(…)
Security Email Spoofing 15.07.2019 by Dominique Althuser Have you ever had this unhealthy sensation of being accused of facts that do not concern you? To feel helpless in the face of an accusing mail, which, because of its imperative and accusing tone,(…)
Database Administration & Monitoring, MySQL, Security MySQL 8 and Security – Encryption of binary logs 22.02.2019 by Elisa Usai As I discussed in some of my recent talks at conferences (at the DOAG for example), MySQL 8 came out with new features which bring lots of improvements in terms of security.
Database Administration & Monitoring, MySQL, Security Password Verification Policy in MySQL 8.0.13 29.10.2018 by Elisa Usai The new release 8.0.13 for MySQL is available since last week. Concerning security, this comes with a new feature already announced: the Password Verification Policy. Let's have a look...
Database Administration & Monitoring, MySQL, Security MySQL 8.0 – Roles are finally there 22.06.2018 by Elisa Usai Roles have been existing on many RDBMS for a long time by now. Starting from version 8.0, this functionality is finally there for MySQL. The most important advantage is to define only once a role that includes a “set(…)