Tag

cron jobs

1 views collected around this technical thread.

Efficient Ops
Efficient Ops
Apr 10, 2024 · Information Security

How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide

This article walks through the symptoms, root causes, forensic commands, and remediation actions taken to investigate and clean a Linux server that was compromised, highlighting key security lessons such as tightening SSH access, monitoring critical files, and restoring locked system utilities.

LinuxServer Intrusionchattr
0 likes · 15 min read
How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide
Laravel Tech Community
Laravel Tech Community
May 30, 2022 · Operations

Understanding and Using crontab for Task Scheduling on Linux

This guide explains how to install, start, and stop the crontab service, configure global and user-specific cron directories, write crontab entries with proper syntax, and apply advanced techniques such as output redirection, nohup, background execution, and date-based log naming for reliable Linux task automation.

LinuxSystem AdministrationTask Scheduling
0 likes · 9 min read
Understanding and Using crontab for Task Scheduling on Linux
Top Architect
Top Architect
Feb 27, 2021 · Big Data

Data Platform vs Backend Architecture: Benefits of Moving Functionality to a Data Platform

The article explains why shifting batch jobs, reporting, and machine‑learning model training from traditional backend services to a dedicated data platform can simplify development, improve fault tolerance, and scale analytics, using real‑world examples from Spotify and best‑practice guidelines.

Batch ProcessingBig DataData Engineering
0 likes · 11 min read
Data Platform vs Backend Architecture: Benefits of Moving Functionality to a Data Platform
Efficient Ops
Efficient Ops
May 20, 2019 · Information Security

How a Hidden gpg-agentd Malware Hijacked an Alibaba Cloud Server

After a routine morning, the author discovers an Alibaba Cloud server frozen due to malicious outbound traffic, then traces a sophisticated malware chain involving a disguised gpg-agentd process, malicious cron jobs, compromised SSH keys, Redis exploitation, and mass scanning, culminating in detailed forensic analysis and security recommendations.

cron jobsgpg-agentdmalware analysis
0 likes · 13 min read
How a Hidden gpg-agentd Malware Hijacked an Alibaba Cloud Server