System

16/06/2016
Print Friendly, PDF & Email

How to install PSAD Intrusion Detection on Ubuntu 16.04 LTS server

Source: thefanclub.com This guide is based on various community forum posts. This guide is intended as a relatively easy step by ...
Lire La Suite

How to force ssh login via public key authentication

Source: xmodulo There is ongoing debate on the pros and cons of using passwords versus keys as ssh authentication methods ...
Lire La Suite

Append TimeStamp to file name

I need to create a shell script that appends a timestamp to existing file. I mainly use Mac OS X for ...
Lire La Suite

Ubuntu Linux Change Hostname (computer name)

I am a new Ubuntu Linux laptop user. I setup my computer name to ‘tom’ during installation but now I ...
Lire La Suite

Pure-FTPd et MySQL

Le logiciel pure-ftpd est l’un des serveurs FTP les plus simple à installer et configurer c’est pourquoi si vous cherchez ...
Lire La Suite

How to monitor a log file on Linux with logwatch

Linux operating system and many applications create special files commonly referred to as "logs" to record their operational events. These ...
Lire La Suite

How to Backup Linux? 15 rsync Command Examples

rsync stands for remote sync.rsync is used to perform the backup operation in UNIX / Linux.rsync utility is used to ...
Lire La Suite

Collect & visualize your logs with Logstash, Elasticsearch & Redis

Source: michael.bouvy.net Update of December 6th : although Logstash does the job as a log shipper, you might consider replacing ...
Lire La Suite

How to secure SSH login with one-time passwords on Linux

As someone says, security is a not a product, but a process. While SSH protocol itself is cryptographically secure by ...
Lire La Suite

How to run iptables automatically after reboot on Debian

If you have customized iptables rules, and would like to load the customized iptables rules persistently across reboots on Debian, ...
Lire La Suite

Sécuriser son serveur Linux

Sécuriser LinuxCe guide va vous apprendre à sécuriser un serveur et donc vous initier aux thématiques de la sécurité informatique ...
Lire La Suite

What are useful CLI tools for Linux system admins ?

System administrators (sysadmins) are responsible for day-to-day operations of production systems and services. One of the critical roles of sysadmins ...
Lire La Suite

What are good open-source log monitoring tools on Linux ?

In an operating system, logs are all about keeping track of events, be it critical system errors, resource usage warnings, ...
Lire La Suite

16 commands to check hardware information on Linux

Source: BinaryTides Hardware information Like for every thing, there are plenty of commands to check information about the hardware of ...
Lire La Suite

inotify / incron : Lancer une commande en cas d’action sur un fichier/un répertoire

“inotify”, Remplaçant de “dnotify”, est une technologie, intégrée au noyau Linux (>=2.6.13) , destinée à notifier les événements, modifications, accès, ...
Lire La Suite

Simple versioned TimeMachine-like backup using rsync

Using TimeMachine with rsync: Over many years, I have dealt with scripts that do backup versioning, i.e., maintain multiple backups ...
Lire La Suite
Les commentaires sont fermés.