Tags » Configuration File

How to Protect Linux Against the Shellshock Bash Vulnerability

The Shellshock vulnerability can be exploited on systems that are running Services or applications that allow unauthorized remote users to assign Bash environment variables.

Examples of exploitable systems include the following: 282 more words


OpenSIPS Installation and Configuration

A. OpenSIPS Installation

1- Get the latest release of OpenSIPS source from OpenSIPS website:

# cd /usr/local/src/

# git clone https://github.com/OpenSIPS/opensips.git -b 1.11 opensips_1_11

# cd opensips_1_11… 1,198 more words