Web HostingWeb Hosting

Unable to find remote helper for ‘https’

How to fix Unable to find remote helper for ‘https’

Googling told me that I needed curl-devel and expat. I can not use yum, so I went and built those as well:

# wget http://curl.haxx.se/download/curl-7.34.0.tar.gz tar
# tar -xvf curl-7.34.0.tar.gz
# cd curl-7.34.0 ./configure make make install
# cd .. wget http://downloads.sourceforge.net/expat/expat-2.1.0.tar.gz
# tar -xvf expat-2.1.0.tar.gz
# cd expat-2.1.0
# ./configure
# make
#make install

if you get any Unable to find remote helper for 'https'  error use below command 

# yum install libcurl* -y

CloudFlare Introduces Virtual DNS Security Service

Security specialist CloudFlare today announced a new Virtual DNS service with the goal of helping to mitigate denial-of-service (DoS) attacks and improving Domain Name System (DNS) security overall.

Complete Story

Unix best practices: Remember, what you’re protecting is not systems but productivity

It’s possible to overdo security and end up damaging productivity. Many years ago, when helping to organize a security conference, I noted that the idea that a system wrapped in a waterproof safe and dropped into the deepest part of the seas was not as “secure” as it was useless. What most of us want are systems that will both be reliable and available. The CIA (confidentiality, integrity, and availability) model is a good reminder that what we’re protecting is not systems but productivity.

Complete Story

Worst security breaches of the year 2014: Sony tops the list

As 2014 winds down, the breach of Sony Pictures Entertainment is clearly the biggest data breach of the year and among the most devastating to any corporation ever.

Attackers broke in and took whatever they wanted, exfiltrating gigabytes and gigabytes of documents, emails and even entire movies, apparently at will for months and months on end.

Complete story

Segmenting for security: Five steps to protect your network

Relying on a DMZ to protect your network and data is like putting money in a bank that depends on one guard and a single gate to secure its deposits. Imagine how tempting all those piles of money would be to those who had access — and how keen everyone else would be to obtain access. But banks do not keep cash out on tables in the lobby, they stash it in security boxes inside vaults, behind locked doors, inside a building patrolled by a guard and secured by a gate. Likewise, network segmentation offers similar security for an organization’s assets.

Read this full article at Network World

How to use on-screen virtual keyboard on Linux

On-screen virtual keyboard is an alternative input method that can replace a real hardware keyboard. Virtual keyboard may be a necessity in various cases. For example, your hardware keyboard is broken; you do not have enough keyboards for extra machines; your hardware does not have an available port left to connect a keyboard; you are a disabled person with difficulty in typing on a real keyboard; or you are building a touchscreen-based web kiosk.

Complete Story

China Promotes Linux-Based Operating System Against Windows, Android

The Chinese government is promoting China Operating System, a closed source, Linux-based OS that it hopes will supplant Microsoft Windows and Google Android.

Complete Story

How to secure Tomcat

Here are some tips and tricks to help you improve the security of your organization’s Tomcat deployment.

Complete Story

How to manage passwords from the command line on Linux

With password-based authentication so prevalent online these days, you may need or already use some sort of password management tool. There are various online or offline services or software tools for that matter, and they vary in terms of their sophistication, user interface or target environments (e.g., enterprises or end users). For end users, there are a few GUI-based password managers, for instance, KeePass(X). If you do not want any kind of GUI dependency for password management, I would highly recommend pass, a simple command-line utility for password management.

Complete Story

Tails 1.0: A bootable Linux distro that protects your privacy

These days, it seems as though anyone who uses the Internet is a tasty morsel for insatiable data thieves. Marketers, governments, criminals and random snoops won’t be satisfied until they can snarf whatever information they want about us at any time. If you want to dodge ad trackers, have sensitive sources to protect or you just want to conduct your normal online activities without being spied on, then The Amnesiac Incognito Live System (better known as Tails) could help.

Read this full article at Network World