Securing your MySQL server
After installing a MySQL database server, like the one I posted earlier, if it's going to be a production environment than you should consider securing the instance by eliminating some of the basic vulnerabilities that come with a generic install.Fortunately MySQL and MariaDB already come with a tool for that purpose, called mysql_secure_installation. This program enables to perform the following improvements to the security of your installation:
- set a password for root accounts.
- remove root accounts that are accessible from outside the local host.
- remove anonymous-user accounts.
- remove the test database (if exists), which by default can be accessed by anonymous users.
Be advised that as of MySQL 5.7.2, this tool is an executable binary available on all platforms. Before version 5.7.2, it was a script available only for Unix and Unix-like systems.
Invoking the tool without any arguments:
shell> mysql_secure_installation
The script will prompt you to determine which actions to perform:NOTE: RUNNING ALL PARTS OF THIS SCRIPT IS RECOMMENDED FOR ALL MySQL
SERVERS IN PRODUCTION USE! PLEASE READ EACH STEP CAREFULLY!
In order to log into MySQL to secure it, we'll need the current
password for the root user. If you've just installed MySQL, and
you haven't set the root password yet, the password will be blank,
so you should just press enter here.
Enter current password for root (enter for none):
OK, successfully used password, moving on...
Setting the root password ensures that nobody can log into the MySQL
root user without the proper authorisation.
You already have a root password set, so you can safely answer 'n'.
Change the root password? [Y/n] n
... skipping.
By default, a MySQL installation has an anonymous user, allowing anyone
to log into MySQL without having to have a user account created for
them. This is intended only for testing, and to make the installation
go a bit smoother. You should remove them before moving into a
production environment.
Remove anonymous users? [Y/n] y
... Success!
Normally, root should only be allowed to connect from 'localhost'. This
ensures that someone cannot guess at the root password from the network.
Disallow root login remotely? [Y/n] y
... Success!
By default, MySQL comes with a database named 'test' that anyone can
access. This is also intended only for testing, and should be removed
before moving into a production environment.
Remove test database and access to it? [Y/n] y
- Dropping test database...
ERROR 1008 (HY000) at line 1: Can't drop database 'test'; database doesn't exist
... Failed! Not critical, keep moving...
- Removing privileges on test database...
... Success!
Reloading the privilege tables will ensure that all changes made so far
will take effect immediately.
Reload privilege tables now? [Y/n] y
... Success!
Cleaning up...
All done! If you've completed all of the above steps, your MySQL
installation should now be secure.
Thanks for using MySQL!
Basic MySQL installation on Ubuntu Server
Cenario
Installation Process
sudo apt-get install mysql-server
sudo netstat -tap | grep mysql
sudo service mysql restart
Post Install Validation
shell> mysql --user=user_name --password=your_password db_name
For the list of all MySQL commands type 'help'. To exit, type 'quit'.
Installation path analysis
- /usr/bin/ - binary files for the server and command line utilities
- /usr/lib/ - libraries
- /usr/share/man/ - manual pages
- /usr/share/mysql/ - helper scripts for installation and language support
- /var/lib/mysql/ - data files
- /usr/lib/mysql/plugin/ - plugins installed
- /etc/mysql/ - configuration files
Visual Studio 2015 Final Release Event
Link: Visual Studio 2015 Final Release EventWatch the live event or download it now:
https://www.visualstudio.com/downloads/download-visual-studio-vs
JQuery getJSON fails on IE
On a current project, I found that the ajax calls scripted using jquery’s getJSON were failing with no error message and didn’t even get to send the http request.
Doing some searches on the Internet, I found all sorts of mumbo jambo, about previous versiosn of IE not supporting xmlHTTPRequest, possible hacks to the code and turning the getJSON use into the equivalent ajax request.
Turns out, our test site was being fitted into the Intranet Security Zone and there’s an option, that usually gets turned on, where you can set IE to use the compatibility view for every intranet site:
Although useful for legacy software on corporate environments, it’s killing modern web development.
I’m really looking forward to living on the Edge:
“we encourage site developers to update their sites now to work well in Edge mode and serve the same markup they use with other browsers”
'It's a graveyard': The software devs leaving Greece for good | ZDNet
Link: 'It's a graveyard': The software devs leaving Greece for good | ZDNetWith the current globalization of services, is imigration still the way to go? Can’t developers land a a remote job and work from their homes?
Maybe we’re all ready to be customers for shopping and services that are in “the clouds”, but not for staffing projects.
when will we put people up there too?
No comments :
Post a Comment