Latest News: Linux shell script to change you ssh port

Latest Page 7

VPS List AgentShare the best VPS relate with you

Five Examples Of The ping Utility
Tutorial

Five Examples Of The ping Utility

willing 2Year(s) Ago (2017-03-14) 314 View(s) 0 Comment(s)

What is ping Utility? Before going through some real world examples of the ping utility, let me explain what this commandline tool is and its purpose. The ping utility is used to test the reachability of a host on an Internet Protocol (IP) network. Its names comes from the active sonar method which is used to create a pulse of sound (ping) under the water and listening to echo requests from surrounding objects. This method is the best way to explain how the network ping utility works. The ping u...

How To Install LAMP Stack On Debian 8
Tutorial

How To Install LAMP Stack On Debian 8

willing 2Year(s) Ago (2017-03-14) 425 View(s) 0 Comment(s)

LAMP is a combination of operating system and open-source software stack. The acronym LAMP came from the first letters of Linux, Apache HTTP Server, MySQL or MariaDB database, and PHP/Perl/Python. This tutorial describes how to install LAMP stack on Debian 8 64 bit server. The same steps will work on Debian 7 and all previous versions. Install LAMP Stack On Debian 1. Install Apache Apache is an open-source multi-platform web server. It provides a full range of web server features including CGI, ...

Install PostgreSQL and phpPgAdmin on Debian 7 ‘Wheezy’
Tutorial

Install PostgreSQL and phpPgAdmin on Debian 7 ‘Wheezy’

willing 2Year(s) Ago (2017-03-14) 294 View(s) 0 Comment(s)

PostgreSQL is a powerful, open-source object-relational database system. It runs on all major operating systems, including Linux, UNIX (AIX, BSD, HP-UX, SGI IRIX, Mac OS, Solaris, Tru64), and Windows OS. In this handy tutorial, let us see how to install PostgreSQL on Debian 7 ‘Wheezy’. Install PostgreSQL Switch to root user using the command: [crayon-5bcd02b479694944040758/] Install it with following command: [crayon-5bcd02b47969d304372621/] Access PostgreSQL The default database name and databa...

Reset MariaDB Root Password in CentOS 6.4
Tutorial

Reset MariaDB Root Password in CentOS 6.4

willing 2Year(s) Ago (2017-03-14) 332 View(s) 0 Comment(s)

I have forgot my MariaDB root password and when trying to reset the root password I was thinking, “Let Unixmen readers know how I have solved my issue”. First, stop running MySQL daemon: [crayon-5bcd02b479bf7847361216/] Start MySQL Daemon in Safe Mode: [crayon-5bcd02b479c00078944195/] Login to MariaDb server without a password: [crayon-5bcd02b479c02182720664/] Set the  new password in the line below: [crayon-5bcd02b479c07633655374/] Flush privileges on exit: [crayon-5bcd02b479c09051003814/] Rest...

IPTABLES VS FIREWALLD
Tutorial

IPTABLES VS FIREWALLD

willing 2Year(s) Ago (2017-03-14) 361 View(s) 0 Comment(s)

Today we will walk through iptables and firewalld and we will learn about the history of these two along with installation & how we can configure these for our Linux distributions. Let’s begin wihtout wasting further more time. What is iptables? First, we need to know what is iptables. Most of senior IT professionals knows about it and used to work with it as well. Iptables is an application / program that allows a user to configure the security or firewall security tables provided by the Li...

10 Useful Utilities For Linux Users
Tutorial

10 Useful Utilities For Linux Users

willing 2Year(s) Ago (2017-03-14) 334 View(s) 0 Comment(s)

Introduction In this tutorial, I have collected 10 useful utility tools for Linux users which will include various network monitoring, system auditing or some another random commands which can help users to enhance their productivity. I hope you will enjoy them. 1. w Display who is logged into the system and what process executed by them. [crayon-5bcd02b47aac8503269547/] for help [crayon-5bcd02b47aada121028820/] for current user [crayon-5bcd02b47aade353678656/] 2. nmon Nmon or nigel’s monitor is...

Learn file management commnad line required for RHCSA
Tutorial

Learn file management commnad line required for RHCSA

willing 2Year(s) Ago (2017-03-14) 323 View(s) 0 Comment(s)

3.0 Introduction to Red Hat Linux Key file system Welcome back, in this ‘RHCSA examination preparation guide’ series two articles are published, this is third part of the series in continuation, in previous two articles we understood basics of Red Hat Enterprise Linux including Installation, system registration to Red Hat network, then we learned few Linux basic commands, what is bash, what is Linux terminal. Let us move ahead, as we know that everything in Linux is a file, all of the configurat...

HOW TO ADD CRON JOBS IN LINUX AND UNIX
Tutorial

HOW TO ADD CRON JOBS IN LINUX AND UNIX

willing 2Year(s) Ago (2017-03-14) 349 View(s) 0 Comment(s)

  Introduction Cron job are used to schedule commands to be executed periodically. You can setup commands or scripts, which will repeatedly run at a set time. Cron is one of the most useful tool in Linux or UNIX like operating systems. The cron service (daemon) runs in the background and constantly checks the /etc/crontab file, and /etc/cron.*/ directories. It also checks the /var/spool/cron/ directory. Command of crontab crontab is the command used to install, deinstall or list the tables ...

How to Prevent SSH Brute Force Attacks with Fail2Ban on Debian 7
Tutorial

How to Prevent SSH Brute Force Attacks with Fail2Ban on Debian 7

willing 2Year(s) Ago (2017-03-14) 307 View(s) 0 Comment(s)

Fail2ban is an open-source intrusion prevention system that can be used to prevent brute force attacks and other suspicious malicious attacks. It scans log files (e.g. /var/log/apache/error_log) and bans IP’s that show the malicious signs such as too many password failures, seeking for exploits etc. Generally Fail2Ban then used to update firewall rules to reject the IP addresses for a specified amount of time, although any arbitrary other action (e.g. sending an email, or ejecting CD-ROM tray) c...

How To Install Fail2Ban On CentOS 7
Tutorial

How To Install Fail2Ban On CentOS 7

willing 2Year(s) Ago (2017-03-14) 463 View(s) 0 Comment(s)

Brute force attacks are a way for malicious hackers to get access on your machine so in order to protect from these kind of attacks you need to prepare. A very good solution is the use of an intrusion prevention framework on your server such as Fail2Ban which will provide security on your server by blocking and banning the ip address from which the attack is coming from. Experiencing ssh attacks on your server is a real struggle and I am sure you don’t want to be part of that so better follow th...