Technology Errors

CentOS Linux Configure Script Error – No package ‘libdaemon’ found

While running a configure script before compiling an application on CentOS Linux I received an error regarding libdaemon which caused the configure script to fail. Using YUM I was able to list the available packages that included libdaemon in the name, install one, and then move past that error in the configure script. Below I show how to list packages using YUM with libdaemon in the name and then show example output of installing libdaemon-devel which is the package needed by the configure script.

Information Security

Connect To Fortinet VPN On OSX, Download FortiClient SSL VPN For OSX

Not sure if Fortinet makes it impossible to find the FortiClient SSL VPN application for Mac OSX on purpose or not but it appears to be free for the simple client version so I wanted to provide a location to download the client easily. On Windows you can bring up Internet Explorer and make a SSL VPN connection easily but since IE is not available on OSX it is necessary to have the stand alone FortiClient SSL VPN application. Be careful if you are going to download the Fortinet FortiClient elsewhere as if it is anything other than the simple SSL VPN client it is really bloated.

Information Security

WordPress Site Redirected To tenderloin.osa.pl Via Search Engine Click Jacking

So earlier today I noticed a discrepancy in traffic to question-defense.com and because of a previous incident I knew exactly where to look. Sure enough a similar attack had been performed which we are coining Search Engine Click Jacking. In this case we are sure that a single files permissions were left open and the attackers were able to write PHP into the file which caused traffic being referred to our site from many of the major search engines to be redirected to tenderloin.osa.pl. Our site is built using WordPress however any site built in PHP with incorrect permissions on any files are vulnerable to this type of attack. Below is more information about the attack, how to search for the attack, and a simple bash script that will remove the infected code from PHP files on your web site.