background preloader


Facebook Twitter

Linux (Ubuntu) Desktop.


DNS & LoadBalancing. Nmap - Free Security Scanner For Network Exploration & Security. KeepAlived - HowTo. Ubuntu Networking Configuration Using Command Line  If you're new here, you may want to subscribe to my RSS feed and if you have questions related to your ubuntu system post question to our forums.

Ubuntu Networking Configuration Using Command Line 

Thanks for visiting! Sponsored Link The basics for any network based on *nix hosts is the Transport Control Protocol/ Internet Protocol (TCP/IP) combination of three protocols. This combination consists of the Internet Protocol (IP),Transport Control Protocol (TCP), and Universal Datagram Protocol (UDP). By Default most of the users configure their network card during the installation of Ubuntu. Configure Network Interface Using Command-Line You can configure a network interface from the command line using the networking utilities. Configuring DHCP address for your network card If you want to configure DHCP address you need to edit the /etc/network/interfaces and you need to enter the following lines replace eth0 with your network interface card sudo vi /etc/network/interfaces Note :- Use vi editor if you don't have GUI installed sudo /bin/hostname.

Comment devenir un bon linuxien, en peu de temps. Serveur IRC (hybrid-ircd + hybserv) Configurer et utiliser le ssh. 20 Linux Server Hardening Security Tips. Securing your Linux server is important to protect your data, intellectual property, and time, from the hands of crackers (hackers).

20 Linux Server Hardening Security Tips

The system administrator is responsible for security Linux box. In this first part of a Linux server security series, I will provide 20 hardening tips for default installation of Linux system. Linux Server Hardening Checklist and Tips The following instructions assume that you are using CentOS/RHEL or Ubuntu/Debian based Linux distribution. #1: Encrypt Data Communication All data transmitted over a network is open to monitoring.

Use scp, ssh, rsync, or sftp for file transfer. . #1.1: Avoid Using FTP, Telnet, And Rlogin / Rsh Services Under most network configurations, user names, passwords, FTP / telnet / rsh commands and transferred files can be captured by anyone on the same network using a packet sniffer. . #2: Minimize Software to Minimize Vulnerability Do you really need all sort of web services installed? #3: One Network Service Per System or VM Instance. 20 Linux System Monitoring Tools Every SysAdmin Should Know. Need to monitor Linux server performance?

20 Linux System Monitoring Tools Every SysAdmin Should Know

Try these built-in commands and a few add-on tools. Most Linux distributions are equipped with tons of monitoring. These tools provide metrics which can be used to get information about system activities. You can use these tools to find the possible causes of a performance problem. The commands discussed below are some of the most basic commands when it comes to system analysis and debugging server issues such as: Finding out bottlenecks.Disk (storage) bottlenecks.CPU and memory bottlenecks.Network bottlenecks. #1: top - Process Activity Command The top program provides a dynamic real-time view of a running system i.e. actual process activity.

Fig.01: Linux top command Commonly Used Hot Keys The top command provides several useful hot keys: => Related: How do I Find Out Linux CPU Utilization? #2: vmstat - System Activity, Hardware and System Information Display Memory Utilization Slabinfo # vmstat -m.


Vala. Introduction Vala is a new programming language that aims to bring modern programming language features to GNOME developers without imposing any additional runtime requirements and without using a different ABI compared to applications and libraries written in C.


News About Vala Using Vala Contributing There is a mailing list for developer and general discussions. Jürg Billeter <j at bitron dot ch> (blog) CategoryProject.