Vulnerability CVE Exploit name Public vulnerability name Firmware changes Spectre 2017-5753 Variant 1 Bounds Check Bypass (BCB) No Spectre 2017-5715 Variant 2 Branch Target Injection (BTI) Yes Meltdown 2017-5754 Variant 3 Rogue Data Cache Load (RDCL) No Spectre-NG 2018-3640 Variant 3a Rogue System Register Read (RSRE) Yes Spectre-NG 2018-3639 Variant 4 Speculative Store Bypass (SSB) […]

List of Speculative Execution Vulnerabilities

How to update FreeBSD using beadm
Beadm is a tool which provides a wonderful and distinctive functionality on Solaris, OpenIndiana and FreeBSD. It relies on the ZFS filesystem allowing to take a filesystem snapshot. That can be used to manage the so called boot environments which provide a great way to secure updates, even when everything goes down the tubes. Hence […]

What is GNU/Linux?
To answer this question one must split it. Plus make other questions like: «What is a, so called, Linux distro?». It seems complex and it is in a way. But let´s explain GNU/Linux in simple terms. GNU stands for GNU is Not UNIX. So it´s clear is not UNIX but it´s related to it in […]

100 articles mark at Adminbyaccident.com
This is the 100th post here at Adminbyaccident. Little I knew when I starting posting that I would reach the ‘impossible’ mark of the 100 articles. Sure, some of them are not very interesting, nor instructive. Three years ago I wasn’t the same and I hope in three years time I’m still here and kicking. […]

A brief introduction to Regular Expressions
A regular expression is a set of characters, a string of characters if you will, that specify a pattern. Ever used the grep command? It makes use of them. The ‘grep’ command is very handful when one needs to look for certain things inside a text file, or looking for some specific pattern from another […]

How to load and unload kernel modules in Linux
Kernel modules permit enabling hardware features on a given system. For example, if we need to read from a particular filesystem from a hard drive, we need to load a particular kernel module. Or use a specific network card, a sound card or sound device, a video display, etc. This is mostly done automatically in […]

How to configure a Virtual Host in Apache
You may have just one website and that is ok. If that is your case you can avoid this entire chapter. But some of you may also have several websites. And quite probably you want to use one single public ip to resolve all the domains you have. The Apache documentation is the main resource […]

How to test SSL/TLS configurations
If you are in charge of any site with SSL/TLS conenctions enabled you are always in the chase to get the best possible and most secure configuration. This isn’t always the case and the lack of time does take its toll on many administrators. Those individuals are always asked to do more with less and […]

A brief introduction to SSL/TLS certificates
SSL stands for Secure Sockets Layer and it an old implementation of a crytographic protocol. TLS, or Transport Layer Security, is a new one. They are both used to have privacy in the communications between different parties. They are used to secure email, web browsing, instant messaging, etc These protocols work in a complex way […]

How to install the FAMP stack
You may have heard of the LAMP stack which stands for Linux, Apache, MySQL and PHP or Perl. This is the same but instead of using the GNU/Linux operating system we’ll use FreeBSD. This is the FAMP stack. There are two ways to install software in FreeBSD, packages and the ports collections. Which in the […]
