Installation of CentOS 8 on Ubuntu Server KVM
Assumptions: A. Kernel-based Virtual Machine or KVM package is already installed on your Ubuntu Server Verify: dpkg -s qemu-kvm Sample output: root@ubuntuserver1:~# dpkg -s qemu-kvm Package: qemu-kvm...
View ArticleSecuring SSH using Firewalld on RHEL8 or CentOS8 Replacing TCP_Wrappers
As per Redhat official document titled “”Replacing TCP Wrappers in RHEL 8” (https://access.redhat.com/solutions/3906701 ), it says: The TCP Wrappers package has been deprecated in RHEL 7 and therefore...
View ArticleTop 5 Commands to Find IP address in Linux
These are the commands that can be used to find the private or public IP address in your interface(s). If your IP is NAT’ed and want to find the public IP, refer to this tutorial –> Quick Tip: Get...
View ArticleTop 5 Basic Steps to Troubleshoot Network in Linux
1.Find if your interface has IP address, it’s either obtained dynamically via DHCP server or manually configured using static configuration. You can either use commands from the “iproute” or...
View ArticleHow to Install and Configure Cacti Network Monitoring on Ubuntu
Cacti is an open-source, web-based network monitoring and RRDTool-based Graphing Solution. Compared to MRTG, Cacti stores information in a MySQL database to create graphs and populate data. It was...
View ArticleQuick Tip: Configure SNMP on CentOS for Network Monitoring
CentOS = 192.168.15.22 (SNMP Client) (Tested on CentOS8) Ubuntu = 192.168.15.19 (SNMP Server) (Tested on Ubuntu 16.04.7 LTS) @CentOS 1. Install SNMP package yum install net-snmp Sample Output:...
View ArticleNET-TOOLS vs IPROUTE Cheat Sheet (ifconfig vs ip)
The net-tools has been deprecated and plans to obsolete was stated from debian-devel mailing list around 2009 (https://lists.debian.org/debian-devel/2009/03/msg00780.html ) . As per the post, it says:...
View ArticleQuick Reference: AWS vs Openstack Comparison
Table comparison between the these popular Cloud Computing platforms, Amazon Web Services (AWS) and Openstack based on services. Services AWS Openstack Compute VM Instance Virtual Servers EC2 Nova...
View ArticleTop 5 Favorite Command Line Web Browsers for Linux
Below are my top 5 favorite Linux’s text-based or command line web browsers. The sample look screencapture was done using putty ssh session, using default appearance. lynx Redhat-based/CentOS: yum...
View ArticleTop 3 Command Line Text Editors for Linux
My Top 3 Terminal Text Editors for Linux: 1.vi/vim (vim-minimal/vim-enhanced) Vi IMproved, a programmer’s text editor DESCRIPTION Vim is a text editor that is upwards compatible to Vi. It can be used...
View ArticleTop 5 Commands to display Hardware Information on Linux
Top 5 Commands to show Hardware Inventory Information in Linux 1.lshw (list hardware) DESCRIPTION lshw is a small tool to extract detailed information on the hardware configuration of the machine. It...
View ArticleTop 5 Open-Source Web Servers on Linux
My Top 5 Open-Source Web Servers on Linux (2021) 1.Apache is a free and open-source cross-platform web server software and actively maintained by the Apache Software Foundation. It is the most popular...
View ArticleQuick Tip: Screenfetch Installation in CentOS Linux
If you haven’t install screenfetch, you will normally see a command not found error message something like this below: [root@CentOS-Server ~]# screenfetch bash: screenfetch: command not found… Steps in...
View ArticleTop 15 Services to Remove for Securing Ubuntu Linux
As part of the Best Security Practices, it is recommended to disable all services that are not required for normal operation to prevent the vulnerabilities exploitation of these services. These are the...
View ArticleTop 6 Service Clients to remove for Securing Ubuntu Linux
As part of Best Security Practices, it is recommended to remove service clients that are not required for normal operation to reduce local attack. Here are the following programs or clients that need...
View ArticleSecuring Ubuntu Linux with Sysctl
Sysctl is a tool to configure or modify kernel parameters at runtime. It is a way to fine tune the kernel, of course without the need to rebuild the kernel. Sample Options: Write variable from the...
View ArticleUbuntu Security Recommendation on Logging
A. Install and configure Rsyslog Rsyslog is the recommended syslog server on Linux, and has replaced the “syslogd” program. It is has better features and improvements such as TCP log transmission,...
View ArticleAuditd Recommended Configuration on Ubuntu Linux for System Auditing
Here’s how to install the program “auditd” and best security practice and recommended settings for system auditing. 1.Install the auditd a. Verify if the package is installed or not, using the dpkg...
View ArticleTop 20 Recommended SSH Configuration on Ubuntu Linux
Secure Shell or SSH is a cryptographic network protocol used to securely log or access to remote systems. The most popular tool is the OpenSSH which provides a large suite of secure tunneling...
View ArticleUncomplicated Firewall (UFW) Recommended Configuration on Ubuntu Linux
Uncomplicated Firewall (UFW) -frontend for iptables and is a program for managing a netfilter firewall. Some key things to consider: 1. Installation: apt install ufw 2. Verify if ufw is enabled:...
View Article