John 的文章
-
IPTABLES VS FIREWALLD
Today we will walk through iptables and firewalld and we will learn about the history of these two along with installation & how we can configur…… -
10 Useful Utilities For Linux Users
Introduction In this tutorial, I have collected 10 useful utility tools for Linux users which will include various network monitoring, system auditi…… -
Learn file management commnad line required for RHCSA
3.0 Introduction to Red Hat Linux Key file system Welcome back, in this ‘RHCSA examination preparation guide’ series two articles are published, th…… -
HOW TO ADD CRON JOBS IN LINUX AND UNIX
Introduction Cron job are used to schedule commands to be executed periodically. You can setup commands or scripts, which will repeatedly …… -
How to Prevent SSH Brute Force Attacks with Fail2Ban on Debian 7
Fail2ban is an open-source intrusion prevention system that can be used to prevent brute force attacks and other suspicious malicious attacks. It s…… -
How To Install Fail2Ban On CentOS 7
Brute force attacks are a way for malicious hackers to get access on your machine so in order to protect from these kind of attacks you need to prep…… -
uncompress *.tar.xz in Linux
CentOS yum install -y xz Ubuntu apt-get -y install xz xz -d ***.tar.xz tar -xvf ***.tar -
VirMach – SSD OpenVZ & KVM in 8 locations starting at $2/month!
Visit VirMach from my aff link is ap VirMach With Affiliate To support our site Amir from VirMach sent in this exclusive offer for their 2 y…… -
How to allow 80 3306 22 in your CENTOS 6.0 iptables
iptables -I INPUT -p tcp --dport 80 -j ACCEPT iptables -I INPUT -p tcp --dport 22 -j ACCEPT iptables -I INPUT -p tcp --dport 3306 -j ACCEPT Save it:…… -
How to Benchmark your VPS?
Have you recently purchased a VPS? do you want to see how powerful is that VPS and what can you do with it? or do you want to write a review for a h……