Attacking the Web Server

As with any kind of application, a web application is dependent on the other layers of the technology stack that support it, including the web server, operating system, and networking infrastructure. Any of these components may be targeted by an attacker, and compromising the technology on which an application depends will very often enable an … Read more

Adding User Accounts mysql – asterisk database

MySQL Cluster

Create mysql user id after logging through root user. mysql -u root -p yourpasswordforroot CREATE USER ‘monty’@’localhost’ IDENTIFIED BY ‘some_pass’; GRANT SELECT,INSERT,UPDATE,DELETE,CREATE,DROP ON bankaccount*. TO ‘monty’@’localhost’; FLUSH PRIVILEGES;