Is your server as secure as it could be? Sure, you use a firewall, mandate strong passwords, and patch regularly. You even take a proactive approach by performing security audits with tools such as nmap and Nessus. Yet you may still be vulnerable to zero-day exploits and privilege escalation attacks.
Last month I introduced the ABC music notation system. This month, I continue our tour of notation programs for Linux with a look at the Common Music Notation system from composer/programmer Bill Schottstaedt.
In the simplest terms, netcat is a utility that reads and writes data across the network. Here then is an introduction to netcat for Linux users who may not be familiar with the "TCP/IP Swiss Army knife."
This document describes an easy way to automate Apt updates based on a Debian Sarge box.
Do you spend a lot of time moving around the filesystem with cd commands, typing ls to see what’s there? Do you build lists of arguments on the command line using wildcards or filename completion? If you do a lot of work with files and directories, vshnu is worth a look.
I've recently learnt of an interesting new features of OpenSSH v4 which allows you to reuse open connections when connecting to the same host more than once. If you regularly have multiple open connections to a single host this is a big timesaver.
This tutorial provides step-by-step instructions on how to install Xen (version 2) on a Debian Sarge (3.1) system. It should apply to Ubuntu systems with little or no modifications.
Now that we have ripped out the stock guts out of our Linksys WRT54G and replaced them with a miniature, but mighty, Linux operating system, it's time to configure it to do some actual work. (Part 1 and part 2 cover installation and setting up secure administration of your chopped, dropped little blue box.)
Did you know Konqueror has a handy little program to create photo galleries in a few quick steps? Here's how to use it.
In this introductory article, Jon Watson provides an easy guide to installing the new Open Office source on non-rpm Linux systems. The emphasis is on the use of alien to help convert rpm packages for quick installation to the latest Debian releases.
Sudo is a handy little tool that is of value to both system administrators and common folks like us. What does it do? It allows you to temporarily assume the permissions of another user, up to and including root.
Last week, I wrote a small introduction to Gaim, a great chat client written for GTK. The functionality of Gaim has gotten quite advanced, which has made it one of the leading-edge open-source chat clients currently available.
We've previously covered setting up your own repository for the Debian's apt-get system, but we didn't cover managing automatic uploads. Thankfully this is a simple task with the reprepro, and dupload tools and a small amount of scripting.
The concept of NIC Bonding (or sometimes called NIC Teaming) is that you have two NICs bonded together to appear as if they are the same physical device. The ultimate goal of NIC teaming is limiting a "Single Point of Failure".
A quick glance through the ls man or info pages shows that hackers have been busy adding capabilities to ls and many other longstanding utilities. Let’s take a tour of new features of ls that could have you brushing the cobwebs off of your documentation.
It's not flashy, but if you're re-using text often or need to streamline your template and macro lists, spend a little time with AutoText.
This article will show you how to build a complete DNS System with Debian. This includes a Master server, a Slave server, DDNS, and a bunch of DNSSEC. I'll be using BIND 9 for the server.
QEMU lets you run another operating system on top of your existing OS. Going through the process of installing and configuring QEMU not only gave me a worthwhile new software tool, but also helped me learn a few things about Linux.