Showing headlines posted by linuxer
« Previous ( 1 ... 26 27 28 29 30 31 32 33 34 ... 35 ) Next »Configuring Ubuntu style sudo privilege authorization on Debian
The following lines will describe a procedure on how to mimic Ubuntu's sudo privilege authorization system on Debian Linux. Sudo allows users to run programs with the authorization privileges of another user by supplying their own password for authentication.
How to force fsck to check filesystem after system reboot on Linux
This article will explain a procedure on how to force fsck to perform a filesystem check on the next system reboot or force filesystem check for any desired number of system reboots whether it is root or non-root mount point.
How to establish PPTP VPN client connection on CENTOS/RHEL 7 Linux
This guide will discuss a procedure on how to connect/establish a VPN connection using PPTP protocol on CentOS 7 or Redhat 7 Linux.
How to remove unused kernel images from CentOS Linux system
Every time you update your CentOS Linux and the update includes a new kernel image update the system will not remove your old kernel but it will cumulatively add new kernel to the top of your Linux kernel installed list. Normally, this does not present any issue to your running system and you are not required to take any action to remove any old and unused kernel images.
How to install RegRipper registry data extraction tool on Linux
RegRipper is an open source forensic software used as a Windows Registry data extraction command line or GUI tool. It is written in Perl and this article will describe RegRipper command line tool installation on the Linux systems such as Debian, Ubuntu, Fedora, Centos or Redhat. For the most part, the installation process of command line tool RegRipper is OS agnostic except the part where we deal with installation pre-requisites.
How to use a command line random password generator PWGEN on Linux
This article will provide you with some hints on how to generate random password using shell. Among many other tools which can be used on the Linux command line to generate random passwords such as openssl, mktemp, od or /dev/urandom the specific and easiest tool designed for this purpose is pwgen.
Bitcoin mining node deployment made easy with docker
If you feel extremely lucky or your have a supercomputer to your disposal you my try to mine for bitcoins to earn some extra cash. The complexity of Bitcoin's block chain hashing algorithm gets stronger every 2 weeks to combat the Moore's law so be sure to bring in some decent hardware. In this article we will show how to easily deploy a Bitcoin mining node with docker.
Redirect or block traffic based on country geographical location using Apache mod_geoip
In this config you will learn how to block or redirect web traffic based on the visitor's country geographical location using Apache's geoip mod.
Docker container: Backup and Recovery
This config will describe a procedure of how to back up a Docker container as well as it will also show how to recover a Docker container from backup.
Getting started guide to server management using Puppet
In our scenario we are not going to run hundreds of operating systems and attempt to manage them. Our goal will be much simpler than that. In fact we are going to run only two separate systems running puppet master and puppet agent. Thus through the master puppet server we will attempt to configure a remote node and install "hello" package using puppet agent. This will be done with a bare minimum configuration possible.
How to determine whether a host system is virtual or physical machine
The easiest way on how to determine whether a local or remote host is a virtual machine or bare metal physical server is to use Puppet Lab's tool facter.
How to use screen command to avoid unexpected ssh session termination
Your terminal session may get closed due to various network issues while you are running a process on a remote machine. As the result of this network disconnection your ssh shell session will also inadvertently kill any child processes run under your ssh session on the remote machine.
How to install and setup Debian 8 minimalist Docker Host
Task is to configure x86 bare metal machine as a docker host using Debian 8. You will need a network connection to the host to follow this guide. Also a connected keyboard and monitor.
LEMP ( Linux, Nginx, MariaDB, PHP ) stack Docker image deployment
The automated build docker LEMP image “linuxconfig/lemp” can be used as a testing and also as a production environment for a dynamic PHP applications. It comprises of Debian GNU/Linux, lightweight and yet powerful Nginx webserver, MariaDB a community-developed fork of the MySQL relational database management system and PHP scripting language.
How to upgrade Debian Linux system from Wheezy to Jessie stable release
This article describes an upgrade procedure from Debian Wheezy to Debian Jessie. Debian Linux with a code name "Jessie" is the latest stable Debian release which succeeds previous stable version "Wheezy".
Setting up the python virtualenv development environment on Debian Linux
In this config we will setup a python virtualenv. The intention behind the use of virtualenv as a python development environment is to separate global system installed executables and libraries with packages installed directly inside virtualenv. As a result, one is able to test a given python application with multiple system environments on a single host.
Configure anonymous Internet browsing on Fedora Linux with tor and privoxy
The intention of this config is to provide simple to follow steps on how to configure anonymous Internet browsing on Fedora Linux using privoxy and tor. Both services tor and privoxy are standalone services where tor provides anonymity using onion routing techniques and privoxy is a proxy server with content filtering and advertisement blocking.
Raspbian GNU/Linux upgrade from Wheezy to Raspbian Jessie 8
The upgrade from Raspbian Wheezy to Raspbian 8 Jessie is a fairly simple procedure. However, a caution must be exercised as there is always a chance to break the entire system. The less packages and services are installed the more likely you will be able successfully upgrade your Raspbian Linux system.
How to block a referer spam traffic with Apache webserver
In this config you will learn what is a referer spam traffic, how it is generated and most importantly how to block referer spam on the Linux apache webserver. A referer spam is yet another nuisance invented by spammers causing unaware system admins, marketers or site owners to inadvertently visit or link back to the spammer's site via publicly published access or referer logs on a victim's website. This may consequently lead to a lower search engine ranking, as well as to drain your server's resources.
Linux shell Sticky Bit usage and examples
Before we talk about what is a Sticky bit let's start by explaining why do we need it. For example we have a directory /var/share somewhere on the filesystem with a full access for all permission groups that is owner, group and any, thus all permission bits are set to "on".
« Previous ( 1 ... 26 27 28 29 30 31 32 33 34 ... 35 ) Next »