How to download an ISO image with BitTorrent fast and safely from the command...
If you are one of those guys who have urge to try out every new (or even beta) release of Linux distribution to satisfy your curiosity and stay up-to-date, you will need to deal with the hassle of...
View ArticleHow to encrypt files and directories with eCryptFS on Linux
You do not have to be a criminal or work for the CIA to use encryption. You simply don't want anybody to spy on your financial data, family pictures, unpublished manuscripts, or secret notes where you...
View ArticleHow to block unwanted IP addresses on Linux efficiently
You may want to block IP addresses on your Linux box under various circumstances. For example, as an end user you may want to protect yourself from known spyware or tracker IP addresses. Or when you...
View ArticleHow to filter, split or merge pcap files on Linux
If you are a network admin who is involved in testing an intrusion detection system or network access control policy, you may often rely on offline analysis using collected packet dumps. When it comes...
View ArticleHow to configure fail2ban to protect Apache HTTP server
An Apache HTTP server in production environments can be under attack in various different ways. Attackers may attempt to gain access to unauthorized or forbidden directories by using brute-force...
View ArticleHow to make remote incremental backup of LUKS-encrypted disk/partition
Some of us have our hard drives at home or on a VPS encrypted by Linux Unified Key Setup (LUKS) for security reasons, and these drives can quickly grow to tens or hundreds of GBs in size. So while we...
View ArticleHow to secure SSH login with one-time passwords on Linux
As someone says, security is a not a product, but a process. While SSH protocol itself is cryptographically secure by design, someone can wreak havoc on your SSH service if it is not administered...
View ArticleHow to secure BGP sessions using authentication on Quagga
The BGP protocol runs over TCP, and as such, it inherits all the vulnerabilities of a TCP connection. For example, within a BGP session, an attacker may impersonate a legitimate BGP neighbor, and...
View ArticleHow to access a Linux server behind NAT via reverse SSH tunnel
You are running a Linux server at home, which is behind a NAT router or restrictive firewall. Now you want to SSH to the home server while you are away from home. How would you set that up? SSH port...
View ArticleHow to install Suricata intrusion detection system on Linux
With incessant security threats, intrusion detection system (IDS) has become one of the most critical requirements in today's data center environments. However, as more and more servers upgrade their...
View ArticleRaspberry Pi vs. Raspberry Pi 2 vs. CuBox: performance comparison
Ever since Raspberry Pi was introduced to the world, the consumer market for inexpensive, pocket-size mini computers has been growing rapidly. The huge popularity of these tiny computers in the...
View ArticleHow to edit your documents collaboratively on Linux
"Developed many years before by some high-strung, compulsive assistant, the Bulletin was simply a Word document that lived in a shared folder both Emily and I could access. Only one of us could open it...
View ArticleHow to replicate a MySQL database on Linux
Database replication is a technique where a given database is copied to one or more locations, so that the reliability, fault-tolerance or accessibility of the database can be improved. Replication can...
View ArticleHow to access SQLite database in Perl
SQLite is a zero-configuration, server-less, file-based transactional database system. Due to its lightweight, self-contained, and compact design, SQLite is an extremely popular choice when you want to...
View ArticleHow to combine two graphs on Cacti
Cacti is a fantastic open source network monitoring system that is widely used to graph network elements like bandwidth, storage, processor and memory utilization. Using its web based interface, you...
View ArticleHow to manage Vim plugins
Vim is a versatile, lightweight text editor on Linux. While its initial learning curve can be overwhelming for an average Linux user, its benefits are completely worthy. As far as the functionality...
View ArticleHow to enable SSL for MySQL server and client
When users want to have a secure connection to their MySQL server, they often rely on VPN or SSH tunnels. Yet another option for securing MySQL connections is to enable SSL wrapper on an MySQL server....
View ArticleHow to download apk files from Google Play Store on Linux
Suppose you want to install an Android app on your Android device. However, for whatever reason, you cannot access Google Play Store on the Android device. What can you do then? One way to install the...
View ArticleHow to migrate MySQL to MariaDB on Linux
Since the Oracle's acquisition of MySQL, a lot of MySQL developers and users moved away from MySQL due to Oracle's more closed-door stance on MySQL development and maintenance. The community-driven...
View ArticleHow to monitor stock quotes from the command line on Linux
If you are one of those stock investors or traders, monitoring the stock market will be one of your daily routines. Most likely you will be using an online trading platform which comes with some fancy...
View Article