What’s all the fuss about this SQL Injection thing? It boils down getting some malicious crafted SQL code into the SQL code of an application, destroying data or authenticate yourself without knowing any real password. xkdc has a nice explanation. The simple cases base on wrong escaped strings and the like. But as this SQL […]
After a server crash a wanted to compare all actual files with the backuped data. An easy way is to compare the md5 hashes like that: First create recursively md5 hashes from all files in that directory: find ./backup -type f -print0 | xargs -0 md5sum > /checksums_backup.md5find ./backup -type f -print0 | xargs -0 […]
…yeah, this thing happened only once, but its a great example: I heavily use email on my mobile phone. Actually, i’m using ssl for sending emails. Suddenly out of nothing it stopped working. Receiving via imaps wasn’t a problem, but outgoing mail stuck with “unrecognized command”. Yeah, great. Checked configs in my phone, on my […]