Posts Tagged ‘linux’

Rkhunter rootkit scanning tool installation

Rkhunter rootkit scanning tool installation How to install rkhunter rootkit scanning tool ?   Rkhunter is a rootkit hunter scanning tool, it’s open source  scanner for unix flavors like centos, redhat, fedora and debian. RKhunter scanner detects the back doors, malware, hidden exploits and other vulnerabilities like suspicious keywords in the kernel. With our guide […]

How to protect SSH server

How to secure ssh server from attacks ? SSH (Secure Shell):  Secure the ssh server from brute force attack and other vulnerabilities. The checklist for securing the ssh server can mitigate the risk of getting hacked. The periodical upgrade of ssh package from the repository is always recommended. With our guide we are going to […]

What is IPTABLES?

What is IPTABLES? It’s a firewall built into with your Linux box, IPTABLES is very powerful firewall to control network traffic. The filters can be applied on the source and destination IP address / protocol like TCP, UDP and ICMP. Following IPTABLES guide will assists you to understand the iptables and it’s chains including NAT […]

CollabNetSubversionEdge Server installation and configuration

How to install SVN server on Linux ?   SVN is a part of Software Development Life Cycle(SDLC). SVN server is required to manage source code versioning in development enviornment, CollabNetSubversionEdge is open source (freeware). CollabNetSubversionEdge support on variety of Operating systems like Linux, Solari & Windows.

How to generate an ssh key on windows

How to generate an SSH Key on Windows ?   SSH key generating on windows using tools and import the public in target Linux machine. In our guide we will learn about creating ssh key on windows using tools and import public key to the target PC .   How to generate an SSH Key on […]

IP configuration in linux

How to configure IP address in Linux The IP address configuration in Linux flavors like (centos , redhat & Fedora) are similar. IP address require to communicate with other node in network. communication is nothing but data transfer between nodes.   IP version: IPv4(4octets , each octet equal to 8bits) total 8*4= 32bit (present). Ex: […]

How to use screen command in linux?

Screen command line utility in Linux used to connect multiple terminal session within a terminal, for long running processes (attach and detach). Screen manager is a terminal emulation running multiple terminal session within a single terminal console. This will help administrators to work on multiple tasks without killing the session or fear of lost of […]

How to sync time in Linux from NTP server (Windows) ?

Time sync in Linux from NTP server, in our guide we are using below specifications.

Virtual Hosting

The Virtual Hosting is nothing but running over on the web site on an internet server ex: (xyz.com ,abc.com, demo.xyz.com.) Virtual Hosting is appropriate to accommodate additional range of website sites hosting on a single IP address. This can eliminate the priority of information science address necessities. Virtual Hosting are often deployed on any of […]

How to block ssh access

How to block ssh access ? SSH service can be filter using tcpwrapper (hosts.deny) TCPwrapper is xinetd based service resides under the /etc/xinetd.d. The xinetd Service is a replacement of inetd older version of linux. TCPwrapper used for Security and Hardening by applying filters.

Copyright ©Solutions@Experts.com
Copyright © NewWpThemes Techmark Solutions - www.techmarksolutions.co.uk