Quantcast
Channel: Free Linux Tutorials
Browsing all 73 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Installation of CentOS 8 on Ubuntu Server KVM

Assumptions: A.  Kernel-based Virtual Machine or KVM package is already installed on your Ubuntu Server Verify: dpkg -s qemu-kvm Sample output: root@ubuntuserver1:~# dpkg -s qemu-kvm Package: qemu-kvm...

View Article


Securing SSH using Firewalld on RHEL8 or CentOS8 Replacing TCP_Wrappers

As per Redhat official document titled “”Replacing TCP Wrappers in RHEL 8”  (https://access.redhat.com/solutions/3906701 ), it says: The TCP Wrappers package has been deprecated in RHEL 7 and therefore...

View Article


Top 5 Commands to Find IP address in Linux

These are the commands that can be used to find the private or public IP address in your interface(s). If your IP is NAT’ed and want to find the public IP, refer to this tutorial –> Quick Tip: Get...

View Article

Top 5 Basic Steps to Troubleshoot Network in Linux

1.Find if your interface has IP address, it’s either obtained dynamically via DHCP server or manually configured using static configuration. You can either use commands from the “iproute”  or...

View Article

Image may be NSFW.
Clik here to view.

How to Install and Configure Cacti Network Monitoring on Ubuntu

Cacti is an open-source, web-based network monitoring and RRDTool-based Graphing Solution. Compared to MRTG, Cacti stores information in a MySQL database to create graphs and populate  data. It was...

View Article


Quick Tip: Configure SNMP on CentOS for Network Monitoring

CentOS = 192.168.15.22 (SNMP Client) (Tested on CentOS8) Ubuntu = 192.168.15.19 (SNMP Server) (Tested on Ubuntu 16.04.7 LTS) @CentOS 1. Install SNMP package yum install net-snmp Sample Output:...

View Article

NET-TOOLS vs IPROUTE Cheat Sheet (ifconfig vs ip)

The net-tools has been deprecated and plans to obsolete was stated from debian-devel mailing list around 2009 (https://lists.debian.org/debian-devel/2009/03/msg00780.html ) . As per the post, it says:...

View Article

Quick Reference: AWS vs Openstack Comparison

Table comparison between the these popular Cloud Computing platforms, Amazon Web Services (AWS) and Openstack based on services. Services AWS Openstack Compute VM Instance Virtual Servers EC2 Nova...

View Article


Image may be NSFW.
Clik here to view.

Top 5 Favorite Command Line Web Browsers for Linux

Below are my top 5 favorite Linux’s text-based or command line web browsers. The sample look screencapture was done using putty ssh session, using default appearance. lynx Redhat-based/CentOS: yum...

View Article


Image may be NSFW.
Clik here to view.

Top 3 Command Line Text Editors for Linux

My Top 3 Terminal Text Editors for Linux: 1.vi/vim (vim-minimal/vim-enhanced) Vi IMproved, a programmer’s text editor DESCRIPTION Vim is a text editor that is upwards compatible to Vi. It can be used...

View Article

Top 5 Commands to display Hardware Information on Linux

Top 5 Commands to show Hardware Inventory Information in Linux 1.lshw (list hardware) DESCRIPTION lshw is a small tool to extract detailed information on the hardware configuration of the machine. It...

View Article

Top 5 Open-Source Web Servers on Linux

My Top 5 Open-Source Web Servers on Linux (2021) 1.Apache is a free and open-source cross-platform web server software and actively maintained by the Apache Software Foundation. It is the most popular...

View Article

Image may be NSFW.
Clik here to view.

Quick Tip: Screenfetch Installation in CentOS Linux

If you haven’t install screenfetch, you will normally see a command not found error message something like this below: [root@CentOS-Server ~]# screenfetch bash: screenfetch: command not found… Steps in...

View Article


Top 15 Services to Remove for Securing Ubuntu Linux

As part of the Best Security Practices, it is recommended to disable all services that are not required for normal operation to prevent the vulnerabilities exploitation of these services. These are the...

View Article

Top 6 Service Clients to remove for Securing Ubuntu Linux

As part of Best Security Practices, it is recommended to remove service clients that are not required for normal operation to reduce local attack. Here are the following programs or clients that need...

View Article


Securing Ubuntu Linux with Sysctl

Sysctl is a tool to configure or modify kernel parameters at runtime. It is a way to fine tune the kernel, of course without the need to rebuild the kernel. Sample Options: Write variable from the...

View Article

Ubuntu Security Recommendation on Logging

A. Install and configure Rsyslog Rsyslog is the recommended syslog server on Linux, and has replaced the “syslogd” program. It is has better features and improvements such as TCP log transmission,...

View Article


Auditd Recommended Configuration on Ubuntu Linux for System Auditing

Here’s how to install the program “auditd” and best security practice and  recommended settings for system auditing. 1.Install the auditd a. Verify if the package is installed or not, using the dpkg...

View Article

Image may be NSFW.
Clik here to view.

Top 20 Recommended SSH Configuration on Ubuntu Linux

Secure Shell or SSH is a cryptographic network protocol used to securely log or access to remote systems. The most popular tool is the OpenSSH which provides a large suite of secure tunneling...

View Article

Image may be NSFW.
Clik here to view.

Uncomplicated Firewall (UFW) Recommended Configuration on Ubuntu Linux

Uncomplicated Firewall (UFW) -frontend for iptables and is a program for managing a netfilter firewall. Some key things to consider: 1. Installation: apt install ufw 2. Verify if ufw is enabled:...

View Article
Browsing all 73 articles
Browse latest View live