Fight against SQL injection attacks

In the world of security exploits, one vulnerability, although easily resolved, is number one
on the OWASP top 10: the Structured Query Language (SQL) injection attack. Although this
class has existed since 1995, it remains one of the most prevalent attacks on web assets. Get
to know the SQL injection attack and discover how it’s carried out on a production
website. Then learn how to test a website for this class of vulnerability by using IBM Security
AppScan Standard.


  • No Related Posts

Unable to automatically remove LVM data

I am trying to install ubuntu 12.04 via preceed config onto Dell PowerEdge R710. I had RedHat installed on the box then I tried installing ubuntu 12.04, then auto install popping with Unable to automatically remove LVM data message.

Complete Message: Because the volume groups on the selected device also consist of physical volumes on other devices. it is not considered safe to remove its lvm data automatically. If you wish to use this device for paritioning, please remove its lvm data first.

couple of blogs suggested to use this preceed option

d-i partman-lvm/device_remove_lvm_span boolean true

But no use, I still get the same message.

Also one more question: Ubuntu preceed auto install on dell servers showing first disk as /dev/sdc not /dev/sda. Any idea.

Appreciate for your answer.


Nginx and CouchDB reverse proxy not working

I am trying to proxy [http://localhost:5984] to [http://localhost/couchdb]. I am running nginx for proxy. I have followed the same method mentioned at,

    location /couchdb {
        rewrite /couchdb/(.*) /$1 break;
        proxy_redirect          off;
        proxy_set_header Host $host;
        proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
        proxy_set_header    X-Real-IP       $remote_addr;

but when I run curl localhost/couchdb I get following error


However when I run curl localhost:5984 I got a valid response from couchdb.

{"couchdb":"Welcome","uuid":"337bb4394efe84536a68a63eee55333f","version":"1.5.0","vendor":    {"name":"The Apache Software Foundation","version":"1.5.0"}}

But when I run curl localhost:5984/couchdb I get the same error (and log) which I am receiving via reverse proxy.

The couchdb log file says following

[Fri, 24 Jan 2014 20:41:29 GMT] [debug] [<0.120.0>] 'GET' /couchdb {1,0} from ""
Headers: [{'Accept',"*/*"},
[Fri, 24 Jan 2014 20:41:29 GMT] [debug] [<0.120.0>] OAuth Params: []
[Fri, 24 Jan 2014 20:41:29 GMT] [error] [<0.1114.0>] Could not open file /var/lib/couchdb/couchdb.couch: no such file or directory
[Fri, 24 Jan 2014 20:41:29 GMT] [debug] [<0.120.0>] Minor error in HTTP request: {not_found,no_db_file}
[Fri, 24 Jan 2014 20:41:29 GMT] [debug] [<0.120.0>] Stacktrace: [{couch_httpd_db,do_db_req,2,
[Fri, 24 Jan 2014 20:41:29 GMT] [info] [<0.120.0>] - - GET /couchdb 404
[Fri, 24 Jan 2014 20:41:29 GMT] [debug] [<0.120.0>] httpd 404 error response:

I believe my nginx configuration is correct thats why request is reaching to couchdb. If the missing couchdb.couch file the log says is problem then why this database is not causing trouble when we access it directly on port 5984. It seems the couchdb mochiweb is confusing something.

I am seeing the same behavior on two different distribution

Ubuntu 10.04: CouchDB V 1.10.0
ArchLinux 3.10: CouchDB V 1.5.0


Ok problem solved. I have to add

rewrite /couchdb / break;

to access it over localhost/couchdb. The rule which I mentioned

rewrite /couchdb/(.*)  /$1 break;

will work for localhost/couchdb/db1 etc.. But now my question is can there be a one rule for both patterns ?


IBM Security Directory Integrator 7.2: Completing the security perimeter

Threat-aware identity management is key to securing your IT
organization’s protective perimeter. One of the tasks that are needed to achieve
effective identity management is the ability to implement real-time
synchronization between various identity data sources. See how IBM Security
Directory Integrator, one of the two components of IBM Directory, performs
this task.


  • No Related Posts

Internet Explorer IE11 launches in Enhanced Security for Users despite setting in Server Manager

Our users log on to an RDP server running Windows 2008 R2. I have already gone into Server Manager and disabled ESC for both admins and users. While the setting is applied for admins, users still go into ESC when they launch IE11. I’ve already checked the registry settings and they reflect the appropriate settings from the Server Manager.

What else can cause users to launch into ESC?

Can a user tell IE to start without ESC?


site to site vpn between sonicwall and pfsense

The problem i am facing is establishment of a site to site VPN in between pfSense( version 2.0.1) and SonicWall Pro2040 Enhanced ( Firmware Version: SonicOS Enhanced .
All of the configuration is done properly , still i got the following error in sonicwall –enter image description here

Phase 1 and 2 passes properly but problem with “Payload processing” i found that it could be for shared key mismatch but I double check , no mismatch with shared key in both firewall .
It also shows in sonicwall that tunnel is active-
enter image description here

The log from pfSense is below –
enter image description here

In pfSense the tunnel shows inactive .

I am not too expert in firewall, so I will be grateful if will receive a proper guideline in this regard,


  • No Related Posts

IBM Entrepreneur Week

IBM Entrepreneur Week is a one-of-a-kind opportunity for you to meet, interact, and connect with entrepreneurs, venture capitalists, industry leaders, and academics from around the world. If you’re a startup or entrepreneur, join us online for our inaugural IBM Entrepreneur Week, 3-7 Feb 2014. There will be events taking place online and in locations worldwide, including face-to-face and virtual mentoring sessions, a women entrepreneur-focused event, and a LiveStream broadcast of the SmartCamp Global Finals in San Francisco.


  • No Related Posts

Hadoop data security and Sentry

Given the insights possible with big data, privacy fears have been the
primary focus of its detractors. What has been missing from this discussion is
protection of data with Apache Hadoop. Sentry is one solution aimed at
protecting data within Hadoop by using a fine-grained authorization framework.
This article explores Sentry and shows how it can be used to provide controls
for big data applications in regulated industries.


  • No Related Posts