Do you have Superfish vulnerability?
Test it here: https://filippo.io/Badfish/ or here https://canibesuperphished.com/ ”Superfish” is a awesome name for a vulnerability, at least they did that right.
Test it here: https://filippo.io/Badfish/ or here https://canibesuperphished.com/ ”Superfish” is a awesome name for a vulnerability, at least they did that right.
# Virtual mailbox maps # tabort gamla filen mv /etc/postfix/mysql-virtual-mailbox-maps /etc/postfix/old-mysql-virtual-mailbox-maps # get users from database mysql -u mailadmin –password=password -e ”SELECT email FROM mail_postfix.virtual_users INTO OUTFILE ’/tmp/mysql-virtual-mailbox-maps'” # flytta till postfix mv /tmp/mysql-virtual-mailbox-maps /etc/postfix/mysql-virtual-mailbox-maps # byt rättigheter chown root /etc/postfix/mysql-virtual-mailbox-maps chgrp root /etc/postfix/mysql-virtual-mailbox-maps chmod go-w /etc/postfix/mysql-virtual-mailbox-maps #fix file with sed sed -i ’s/\(.*\)@\(.*\)/\1@\2 \2\/\1\//g’…
Läs mer
It is quite simple to install a more recent postfix version on centos 6. Just do: vi /etc/yum.repos.d/epel-postfix.repo [epel-postfix] name=Latest upstream Postfix 2.9.x and 2.10.x release for RHEL6 baseurl=http://repos.fedorapeople.org/repos/mstevens/postfix/epel-$releasever/$basearch/ enabled=1 skip_if_unavailable=1 gpgcheck=0 [epel-postfix-source] name=Latest upstream Postfix 2.9.x and 2.10.x release for RHEL6 – Source baseurl=http://repos.fedorapeople.org/repos/mstevens/postfix/epel-$releasever/SRPMS enabled=0 skip_if_unavailable=1 gpgcheck=0 Then do a regular yum update.
En rolig överraskning väntade på mina föräldrars sommarställe där de har G4-bredband från Tele2 och alla datorer och telefoner vi tagit med oss körde på IPV6 fullt ut. Bra jobbat Tele2, nu väntar vi på Telia, Comhem, 3, mfl, ni är på efterkälken.
Har i dagarna testat CityCloud, Azure och Googles Developers Console genom att installera Centos 6 & 7. Visst funkar det mycket bra men här kommer ett par iakttagelser.