Tuesday, August 3, 2021

Linux : SCP : without Password : With PEM File :Private key

scp -i mykey.pem somefile.txt root@my.ec2.id.amazonaws.com:/


https://stackoverflow.com/questions/6558080/scp-secure-copy-to-ec2-instance-without-password

Linux : What does the asterisk mean after a filename when you type `ls -l`?

https://superuser.com/questions/178786/what-does-the-asterisk-mean-after-a-filename-when-you-type-ls-l

Windows Terminal - Disable Sound Bell

https://onelharrison.medium.com/how-to-mute-the-windows-terminal-bell-fee86af19ddb




Outlook - Microsoft Outlook - Disable Sound when Incoming Mail Arrives

https://support.microsoft.com/en-us/office/turn-sound-effects-on-or-off-in-outlook-e37d6cb4-5313-4d60-87fd-c4a7c2e4df59

Linux - SetUID - SetGID - Stick Bit - Special File Permissions

setgid Creates a file using owner rather than user creating it

setuid sets the permission of execution

sticky bits - Accidental Delete Protection Bit

https://www.cbtnuggets.com/blog/technology/system-admin/linux-file-permissions-understanding-setuid-setgid-and-the-sticky-bit   [IMP]

https://geek-university.com/linux/uid-user-identifier-gid-group-identifier/


Setting the setuid bit
To set the setuid bit symbolically, we can use chmod u+s </path/to/the/file>.
To set the setuid bit using octal representation we can add "4" to the front of our standard octal permissions


Setting the setgid bit
To set the setuid bit symbolically, we can use chmod g+s </path/to/the/file>.
To set the setgid bit using octal representation we can add "2" to the front of our standard octal permissions


Setting the sticky bit
We can set the sticky bit on directories symbolically with chmod +t :
Or using octal values and putting "1" in front of our standard permissions:

Multisite - Listener - Azure Application Gateway

https://docs.microsoft.com/en-us/azure/application-gateway/multiple-site-overview#wildcard-host-names-in-listener-preview




Azure Devops - OWASP Dependency Check

https://marketplace.visualstudio.com/items?itemName=dependency-check.dependencycheck


OWASP Dependency Check

Dependency-Check is a software composition analysis utility that identifies project dependencies and checks if there are any known, publicly disclosed, vulnerabilities. Currently, Java and .NET are supported; additional experimental support has been added for Ruby, Node.js, Python, and limited support for C/C++ build systems (autoconf and cmake)


The OWASP Dependency Check Azure DevOps Extension enables the following features in an Azure Build Pipeline:

  • Software composition analysis runs against package references during build on both Windows and Linux build agents.

  • Export vulnerability data to HTML, JSON, XML, CSV, JUnit formatted reports

  • Download vulnerability reports from the build's artifacts

Azure - Pipeline - Add Approver for Stage

https://learn.microsoft.com/en-us/azure/devops/pipelines/process/approvals?view=azure-devops&tabs=check-pass