Latest News: Linux shell script to change you ssh port

Tutorial

Tutorial and relative

Write a TCP Server in Python – Part 2

Write a TCP Server in Python – Part 2

willing 2Year(s) Ago (2017-03-14) 854 View(s) 0 Comment(s)

This article is for people that have good knowledge in Python and want to learn and practise new skills and do some network basics. Information about sockets is very important when using Python for network scripting. Before we can create and use sockets we have to import the socket library as we explained and showed in Part 1 of this series. If you have been introduced to my articles about basics in Python you know that we have worked in interactive mode, but now is time to learn and create scri...

Write a TCP Server in Python. Introduction with Sockets – Part 1

Write a TCP Server in Python. Introduction with Sockets – Part 1

willing 2Year(s) Ago (2017-03-14) 590 View(s) 0 Comment(s)

It is late and I decided to code a simple TCP server in pure Python. But what is a server? Anything that receives connection from other computers called clients is called a server. This server keeps the connection open and waits for clients to connect. Python is rich in libraries and the socket library will help us to create the server. What is a socket? A socket is one end-point of a two-way communication link between two programs running on the network. If you have previous experience with soc...

Write a Simple Client in Python

Write a Simple Client in Python

willing 2Year(s) Ago (2017-03-14) 615 View(s) 0 Comment(s)

Now that we finished writing the TCP server it is time to write a simple client which will connect to the server. It is very simple to create our client with the socket library and now we have enough knowledge to do it. Our client will open a connection to our server on 113 port, the port in which our server is listening. One important thing you should know about sockets is that they are like IO objects, you can read from a socket like you read from IO object. After you finish reading make sure ...

How To Manage Multiple SSH Sessions Using Cluster SSH And PAC Manager

How To Manage Multiple SSH Sessions Using Cluster SSH And PAC Manager

willing 2Year(s) Ago (2017-03-14) 646 View(s) 0 Comment(s)

About SSH We, all, know what is SSH, right? SSH, stands for Secure Shell (sometimes known as Secure Socket Shell), is a Cryptographic Protocol that can be used to access remote server and VPS from your local systems. We don’t have to be near to the physical machine to perform commands in the remote system’s Terminal. As it name says, SSH is completely secure and It encrypts all traffic between remote and local systems. SSH is actually a suite of three utilities namely slogin, ssh, and scp. These...

Block SSH Brute Force Attacks Using SSHGuard

Block SSH Brute Force Attacks Using SSHGuard

willing 2Year(s) Ago (2017-03-14) 445 View(s) 0 Comment(s)

SSHGuard is a fast and lightweight monitoring tool written in C language. It monitors and protects servers  from brute force attacks using their logging activity. If someone continuously trying to access your server via SSH with many(may be four) unsuccessful attempts, the SSHGuard will block him/her for a bit by putting their IP address in iptables. Then it releases the lock automatically after sometime. Not only SSH, it protects almost all services such as sendmail, exim, dovecot, vsftpd, prof...

Determine Your Specifications from Command-Line

Determine Your Specifications from Command-Line

willing 2Year(s) Ago (2017-03-14) 421 View(s) 0 Comment(s)

We recently published article about how to determine your computer’s architecture via GUI. Today am going to show how to do the same thing from the command-line with more advanced options in viewing the computer hardware properties as well. Checking computer hardware properties from the commandline can be done using the following commands. The commands below give you more information about your computer hardware ranging from Architecture, Number of CPU(s), Vendor ID, CPU family, CPU MHz, etc. Th...

Use Terminal as a Web Browser

Use Terminal as a Web Browser

willing 2Year(s) Ago (2017-03-14) 391 View(s) 0 Comment(s)

Web browsers are software used to access and view the internet and webpages. We all know about some of the popular web browsers such as Mozilla Firefox, Google Chrome, Opera and others. Surfing the web from the command-line can be somehow scrappy, but you can give it a try as well. Most users doesn’t know that they can browse the web from the command-line. w3m w3m is a World Wide Web (WWW) text based client. It has English and Japanese help files and an option menu and can be configured to use e...

Installing Telnet In CentOS/RHEL/Scientific Linux 6 & 7

Installing Telnet In CentOS/RHEL/Scientific Linux 6 & 7

willing 2Year(s) Ago (2017-03-14) 385 View(s) 0 Comment(s)

Disclaimer: Before installing and using Telnet, keep the following in mind. Using Telnet in public network(WAN) is very very bad idea. It transmits login data in the clear format. Everything will be sent in plain text. If you still need Telnet, It is highly recommended use it in the local area network only. Alternatively, you can use SSH. But make sure you’ve disabled root login in SSH. What Is Telnet? Telnet is a network protocol which is used to connect to remote computers over TCP/IP network....

Ten ‘Top’ Command Examples

Ten ‘Top’ Command Examples

willing 2Year(s) Ago (2017-03-14) 424 View(s) 0 Comment(s)

The “top” command provides a dynamic real-time view of a running system. It can display system summary information as well as a list of processes or threads currently being managed by the Linux kernel. The types of system summary information shown and the types, order and size of information displayed for processes are all user configurable and that configuration can be made persistent across restarts. Here are some top command examples. If we type ‘top’ in terminal, this is how our output looks...

How to Disable SSH Root Login in GNU/Linux

How to Disable SSH Root Login in GNU/Linux

willing 2Year(s) Ago (2017-03-14) 388 View(s) 0 Comment(s)

As we all know, root SSH login is enabled by default in GNU/Linux. We can easily access our remote servers and manage them if they have any issues via SSH. But it is not advisable to allow directly login as root user via SSH, because anyone can brute force root password and will try to access your servers. It’s better to have a separate user account and you can get root privileges by using su command if necessary. This handy tutorial will describe you how to disable root SSH login in GNU/Linux s...