Quantcast
Channel: Xmodulo
Browsing all 54 articles
Browse latest View live

How to download an ISO image with BitTorrent fast and safely from the command...

If you are one of those guys who have urge to try out every new (or even beta) release of Linux distribution to satisfy your curiosity and stay up-to-date, you will need to deal with the hassle of...

View Article



How to encrypt files and directories with eCryptFS on Linux

You do not have to be a criminal or work for the CIA to use encryption. You simply don't want anybody to spy on your financial data, family pictures, unpublished manuscripts, or secret notes where you...

View Article

How to block unwanted IP addresses on Linux efficiently

You may want to block IP addresses on your Linux box under various circumstances. For example, as an end user you may want to protect yourself from known spyware or tracker IP addresses. Or when you...

View Article

How to filter, split or merge pcap files on Linux

If you are a network admin who is involved in testing an intrusion detection system or network access control policy, you may often rely on offline analysis using collected packet dumps. When it comes...

View Article

How to configure fail2ban to protect Apache HTTP server

An Apache HTTP server in production environments can be under attack in various different ways. Attackers may attempt to gain access to unauthorized or forbidden directories by using brute-force...

View Article


How to make remote incremental backup of LUKS-encrypted disk/partition

Some of us have our hard drives at home or on a VPS encrypted by Linux Unified Key Setup (LUKS) for security reasons, and these drives can quickly grow to tens or hundreds of GBs in size. So while we...

View Article

How to secure SSH login with one-time passwords on Linux

As someone says, security is a not a product, but a process. While SSH protocol itself is cryptographically secure by design, someone can wreak havoc on your SSH service if it is not administered...

View Article

How to secure BGP sessions using authentication on Quagga

The BGP protocol runs over TCP, and as such, it inherits all the vulnerabilities of a TCP connection. For example, within a BGP session, an attacker may impersonate a legitimate BGP neighbor, and...

View Article


How to access a Linux server behind NAT via reverse SSH tunnel

You are running a Linux server at home, which is behind a NAT router or restrictive firewall. Now you want to SSH to the home server while you are away from home. How would you set that up? SSH port...

View Article


How to install Suricata intrusion detection system on Linux

With incessant security threats, intrusion detection system (IDS) has become one of the most critical requirements in today's data center environments. However, as more and more servers upgrade their...

View Article

Image may be NSFW.
Clik here to view.

Raspberry Pi vs. Raspberry Pi 2 vs. CuBox: performance comparison

Ever since Raspberry Pi was introduced to the world, the consumer market for inexpensive, pocket-size mini computers has been growing rapidly. The huge popularity of these tiny computers in the...

View Article

Image may be NSFW.
Clik here to view.

How to edit your documents collaboratively on Linux

"Developed many years before by some high-strung, compulsive assistant, the Bulletin was simply a Word document that lived in a shared folder both Emily and I could access. Only one of us could open it...

View Article

Image may be NSFW.
Clik here to view.

How to replicate a MySQL database on Linux

Database replication is a technique where a given database is copied to one or more locations, so that the reliability, fault-tolerance or accessibility of the database can be improved. Replication can...

View Article


Image may be NSFW.
Clik here to view.

How to access SQLite database in Perl

SQLite is a zero-configuration, server-less, file-based transactional database system. Due to its lightweight, self-contained, and compact design, SQLite is an extremely popular choice when you want to...

View Article

Image may be NSFW.
Clik here to view.

How to combine two graphs on Cacti

Cacti is a fantastic open source network monitoring system that is widely used to graph network elements like bandwidth, storage, processor and memory utilization. Using its web based interface, you...

View Article


Image may be NSFW.
Clik here to view.

How to manage Vim plugins

Vim is a versatile, lightweight text editor on Linux. While its initial learning curve can be overwhelming for an average Linux user, its benefits are completely worthy. As far as the functionality...

View Article

Image may be NSFW.
Clik here to view.

How to enable SSL for MySQL server and client

When users want to have a secure connection to their MySQL server, they often rely on VPN or SSH tunnels. Yet another option for securing MySQL connections is to enable SSL wrapper on an MySQL server....

View Article


Image may be NSFW.
Clik here to view.

How to download apk files from Google Play Store on Linux

Suppose you want to install an Android app on your Android device. However, for whatever reason, you cannot access Google Play Store on the Android device. What can you do then? One way to install the...

View Article

Image may be NSFW.
Clik here to view.

How to migrate MySQL to MariaDB on Linux

Since the Oracle's acquisition of MySQL, a lot of MySQL developers and users moved away from MySQL due to Oracle's more closed-door stance on MySQL development and maintenance. The community-driven...

View Article

Image may be NSFW.
Clik here to view.

How to monitor stock quotes from the command line on Linux

If you are one of those stock investors or traders, monitoring the stock market will be one of your daily routines. Most likely you will be using an online trading platform which comes with some fancy...

View Article
Browsing all 54 articles
Browse latest View live




Latest Images