background preloader

Linux

Facebook Twitter

Linux (Ubuntu) Desktop.

Supervision

DNS & LoadBalancing. Nmap - Free Security Scanner For Network Exploration & Security. KeepAlived - HowTo. Ubuntu Networking Configuration Using Command Line  Sponsored Link The basics for any network based on *nix hosts is the Transport Control Protocol/ Internet Protocol (TCP/IP) combination of three protocols.

Ubuntu Networking Configuration Using Command Line 

This combination consists of the Internet Protocol (IP),Transport Control Protocol (TCP), and Universal Datagram Protocol (UDP). By Default most of the users configure their network card during the installation of Ubuntu. You can however, use the ifconfig command at the shell prompt or Ubuntu's graphical network configuration tools, such as network-admin, to edit your system's network device information or to add or remove network devices on your system Configure Network Interface Using Command-Line You can configure a network interface from the command line using the networking utilities. Configuring DHCP address for your network card If you want to configure DHCP address you need to edit the /etc/network/interfaces and you need to enter the following lines replace eth0 with your network interface card sudo vi /etc/network/interfaces.

Comment devenir un bon linuxien, en peu de temps. Serveur IRC (hybrid-ircd + hybserv) Configurer et utiliser le ssh. 20 Linux Server Hardening Security Tips. Securing your Linux server is important to protect your data, intellectual property, and time, from the hands of crackers (hackers).

20 Linux Server Hardening Security Tips

The system administrator is responsible for security Linux box. In this first part of a Linux server security series, I will provide 20 hardening tips for default installation of Linux system. Linux Server Hardening Checklist and Tips The following instructions assume that you are using CentOS/RHEL or Ubuntu/Debian based Linux distribution. #1: Encrypt Data Communication All data transmitted over a network is open to monitoring. Use scp, ssh, rsync, or sftp for file transfer. . #1.1: Avoid Using FTP, Telnet, And Rlogin / Rsh Services Under most network configurations, user names, passwords, FTP / telnet / rsh commands and transferred files can be captured by anyone on the same network using a packet sniffer. . #2: Minimize Software to Minimize Vulnerability Do you really need all sort of web services installed?

#3: One Network Service Per System or VM Instance. 20 Linux System Monitoring Tools Every SysAdmin Should Know. Need to monitor Linux server performance?

20 Linux System Monitoring Tools Every SysAdmin Should Know

Try these built-in commands and a few add-on tools. Most Linux distributions are equipped with tons of monitoring. These tools provide metrics which can be used to get information about system activities. You can use these tools to find the possible causes of a performance problem. The commands discussed below are some of the most basic commands when it comes to system analysis and debugging server issues such as: Finding out bottlenecks.Disk (storage) bottlenecks.CPU and memory bottlenecks.Network bottlenecks. #1: top - Process Activity Command The top program provides a dynamic real-time view of a running system i.e. actual process activity. Fig.01: Linux top command Commonly Used Hot Keys The top command provides several useful hot keys: => Related: How do I Find Out Linux CPU Utilization?

#2: vmstat - System Activity, Hardware and System Information.

Blender

Vala. Introduction Vala is a new programming language that aims to bring modern programming language features to GNOME developers without imposing any additional runtime requirements and without using a different ABI compared to applications and libraries written in C.

Vala

News About Vala Using Vala Contributing There is a mailing list for developer and general discussions. Jürg Billeter <j at bitron dot ch> (blog) CategoryProject.