Tutorial

16/06/2016
Print Friendly, PDF & Email

Port Knocking : sécuriser l’accès à un port

source: http://doc.ubuntu-fr.org/port-knocking Le port-knocking est une méthode permettant de modifier le comportement d'un firewall en temps réel pour provoquer l'ouverture ...
Lire La Suite

Supervision de postfix via mailgraph avec le plugin check_mailstat.pl via Nagios/Centreon

Source:  l'admin sous GNU/Linux - blog libre Voici une procédure permettant de contrôler l’activité d’un serveur de messagerie postfix via ...
Lire La Suite

Howto: Performance Benchmarks a Webserver

source: nixCraft You can benchmark Apache, IIS and other web server with apache benchmarking tool called ab. Recently I was ...
Lire La Suite

Howto: Geolocation for Fail2ban

source: fail2ban.org Using geolocation to locate your attackers. I use fail2ban on my servers to protect them from would-be attackers, if ...
Lire La Suite

Comment créer un tunnel SSH inverse

Parfois que nous avons besoin de vous connecter via SSH à un autre ordinateur, nous trouvons que cet ordinateur que ...
Lire La Suite

8 Practical Examples of Linux Xargs Command for Beginners

The Linux xargs command may not be a hugely popular command line tool, but this doesn't take away the fact that it's extremely ...
Lire La Suite
iptables-save

How to save rules of the iptables?

On a server, iptables rules don't reload automatically at reboot. You need to reload the rules using ax executable shell scripture a ...
Lire La Suite

How to Disable Webcam / FaceTime Camera on Mac Completely

Source: osxdaily.com Some of the more privacy conscious Mac users out there might put tape over their webcam or use apps like Oversight ...
Lire La Suite

HowTo: The Ultimate Logrotate Command Tutorial with 10 Examples

Managing log files effectively is an essential task for Linux sysadmin. In this article, let us discuss how to perform ...
Lire La Suite

Apache Web Server Hardening & Security Guide

Secure Apache Web Server – Practical Guide1       IntroductionThe Web Server is a crucial part of web-based applications. Apache Web Server ...
Lire La Suite

Tutorial: Using VMWare ESXi and PFsense as a network firewall/router

Using VMWare ESXi and PFsense as a network firewall/routerIn most networks, you will have dedicated hardware to function as your ...
Lire La Suite

MySQL database replication with Linux

MySQL database replication with LinuxDatabase replication is a technique where a given database is copied to one or more locations, ...
Lire La Suite

Sauvegarde MySQL

Sauvegarde MySQLPour sauvegarder une base de données (sans et avec compression) :# mysqldump NOM_BASE > NOM_FICHIER # mysqldump NOM_BASE | ...
Lire La Suite

MySQL – Gestion des binlogs

Par défaut, MySQL stocke chaque requête en écriture dans des fichiers appelés binlogs.Configuration des binlogsPar défaut les binlogs sont conservés ...
Lire La Suite

MySQL Master / Slave Replication

Source: Uptime Made EasyMaster Slave MySQL Replication SummaryMaster / Slave replication in MySQL is a great way to store an ...
Lire La Suite

Guide to rsnapshot and incremental backups on Linux

1. Introductionrsnapshot is a backup tool written in Perl that utilizes rsync as its back-end. rsnapshot allows users to create customized ...
Lire La Suite
Les commentaires sont fermés.