Single user mode, also referred to as maintenance mode and runlevel 1, is a mode of operation of a computer running Linux or another Unix-like operating system that provides as few services as possible and only minimal functionality.
Single user mode, also referred to as maintenance mode and runlevel 1, is a mode of operation of a computer running Linux or another Unix-like operating system that provides as few services as possible and only minimal functionality.
The use of data is transforming the world. The way the Federal Government provides, maintains, and uses data has a unique place in society and maintaining trust in federal data is pivotal to a democratic process. The Federal Government needs a coordinated and integrated approach to using data to deliver on mission, serve the public, and steward resources while respecting privacy and confidentiality.
The Federal Data Strategy will define Principles, Practices, and a Year 1 Action Plan to deliver a more consistent approach to federal data stewardship, use, and access. The Federal Data Strategy development team will also test solutions and assumptions along the way with The Data Incubator Project, which will help identify priority use cases and methods that should be replicated or scaled.
The Facebook – Cambridge Analytica fiasco may have grabbed headlines, but in reality, this is but one example of the data misuse and data privacy issues that are currently impacting nearly every industry sector. Consider for a moment, the potential impact of a cyberattack on a federal government agency. In the face of ever-evolving sophisticated cyber threats, federal agencies require increasingly complex data security solutions. Here are the primary data security concerns we’re currently hearing about from clients in the federal space and our recommendations to address these concerns.
Compromised Communications
Another area in which Washington seeks to outsmart digital criminals is in the prevention of eavesdropping. For example MSI catchers or MDIs (mobile device identifiers), also referred to as stingrays, are rogue mobile cell towers that intercept a phone’s voice and data transmission thereby providing the adversary full access to the individual’s phone conversations and text messages.
Stingray hardware is portable and can easily fit inside a backpack. Any member of Congress or government employee using their cellphone in the street could have their conversation intercepted. Even if the person is in their office, a nearby stingray could capture the call as long as it’s within range. The reality is anyone can easily listen in on official government conversations and messages. The Department of Homeland Security publicly acknowledged this activity in April 2018, but the existence of these devices has been known for years – maybe a decade. The issue has only recently appeared on the public radar, but addressing it is a serious matter of national security.
Standard cell phone service is highly vulnerable to hacking, and even carrier-grade cell services aren’t designed with extensive levels of security. Anytime data is archived with a third party, the chances for a breach increase substantially. For this reason, Silent Circle’s secure communications products use “peer-to-peer” encryption. For phones equipped with our Silent Phone application, any voice or text communication is encrypted from the sender’s device to the other party’s device. End-to-end encryption is truly an ideal defense against stingray interception because even if the conversation gets routed through a cell tower simulator, the communication remains encrypted.
Check the permission and ownership for sudo :
[root@baselinux ~]# which sudo
/usr/bin/sudo
[root@baselinux ~]# ls -ld /usr/bin/sudo
—s–x–x. 1 root root 123832 Jun 7 2017 /usr/bin/sudo
if not own by root:
chown root:root /usr/bin/sudo
then
chmod u+s /usr/bin/sudo
Execute
#chmod -t your_folder
to remove the sticky bit.
+
means add
and -
means remove
.
Read the manpage for more details: man chmod
A key best practice for logging is to centralize or aggregate your logs in one place, especially if you have multiple servers or tiers in your architecture. We’ll teach you Best Practices for Application Logging.
Reinstall Corrupted Bootloader
Overview
Boot RHEL into the Rescue Mode
–# chroot /mnt/sysimage
Reinstall Corrupted Bootloader using grub-install
# grub-install –root-directory=/ /dev/sda
Reinstall Corrupted Bootloader from the grub Shell
# grub
–grub> root (hd0,0)
–grub> setup (hd0)
6. Select Reboot to restart the system
Install a Lost or Corrupted System File
# cp /bin/mount /mnt/sysimage/bin
# ls -l /mnt/sysimage/bin
With this, you will be able with the Linux find command to find all files older than 30 days and then execute rm command on them.
The find utility on Linux allows you to pass in arguments, including one to execute another command on each file. We’ll use this in order to figure out what files are older than a certain number of days, and then
use the ls command to list them. To be on the safe side and the
rm command to remove them.
List:
find /path/to/files* –mtime +30 -exec ls –tl {} \;
Note that there are spaces between ls, {}, and \;
Remove:
find /path/to/files* –mtime +30 -exec rm {} \;
An Inode is a data structure used to store the meta data of a file. Inode number represents the collective number of files and folders present in your web hosting account.
It’s quite easy for a disk to have a large number of inodes used even if the disk is not very full.
.Each file and folder use an inode. When the file system is created, a specific block of inodes is created for that file system. If many small files are present, this can cause the pool of inodes to be consumed prematurely.
It’s also possible that deleting files will not reduce the inode count if the files have multiple hard links. As I said, inodes belong to the file, not the directory entry.
If a file has two directory entries linked to it, deleting one will not free the inode.
The number of used/free inodes can be seen here:
#find / -xdev -printf '%h\n' | sort | uniq -c | sort -k 1 -n
or
# df -i /dev/(device) for the entire device or filesystem
Determine what is creating all the small files, and delete them if that is practical.
Add additional space to the device. The ratio will stay the same, but additional inodes will be added to the file system.
vgs
/var/lock/lvm/V_vg00: open failed: No space left on device
Can’t lock volume group vg00: skipping
[root@shebanglinux subsys]# pvscan
/var/lock/lvm/P_global: open failed: No space left on device
Unable to obtain global lock.
[root@shebanglinux subsys]# pvscan -vvv
Processing: pvscan –vvv
O_DIRECT will be used
Setting global/locking_type to 1
File-based locking selected.
Setting global/locking_dir to /var/lock/lvm
Locking /var/lock/lvm/P_global WB
/var/lock/lvm/P_global: open failed: No space left on device
Unable to obtain global lock.
Extend the maximum inode count in an ext3/4 file system.
The Problem is no free inodes on the filesystem
# df -ih
NFS (Network File System) version 3 and 4
Sometime NFS can result in weird problems. For example, NFS mounted directories sometimes contain stale file handles. If you run command such as ls or vi you will see an error:
# ls -l
.: Stale File Handle
# grep -i nfs /var/log/messages
kernel: NFS: server lhub.nas error: fileid changed
kernel: fsid 0:13: expected fileid 0x1015734f5, got 0x15734f5
A filehandle becomes stale whenever the file or directory referenced by the handle is removed by another host, while your client still holds an active reference to the object. A typical example occurs when the current directory of a process, running on your client, is removed from the server (either by a process running on the server or on another client).
So this can occur if the directory is modified on the NFS server, but the directories modification time is not updated.
A possible Solution is to Remount the directory from the NFS Client
# umount -f /path/to/mountpoint
# mount -t nfs nfsserver:/path/to/share /path/to/mountpoint