Uncategorized

now browsing by category

 

Additional Yum Repositories for CentOS/RHEL 7/6/5

undefined

YUM ( Yellowdog Updater, Modified ) is an command-line package-management utility for RPM based Linux systems, It has been released under the GNU General Public License. Yum is useful for rpms which have dependencies, Yum searches for all dependencies of any RPM in all available repositories. Below list contains topRead More

Block SSH Brute Force Attacks with IPTables on Linux Systems

undefined

Detecting a SSH Brute Force Attack If you are under a SSH brute force attack, you will likely see something like this in your logs. Jan 26 03:46:02 host sshd[22731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.39.22.154 Jan 26 03:46:02 host sshd[22731]: pam_succeed_if(sshd:auth): error retrieving information about userRead More

How to Add Protective Measures Against SSH Attacks on Linux Systems

undefined

Earlier this week, I noted that ssh brute force attacks are on the rise. These attacks attempt to guess SSH passwords by repeatedly accessing your server. Often these attacks can disrupt SSH services. As I noted yesterday, you can use IPtables to rate-limit or throttle ssh connections. Today, I wantRead More

How to Backup and Restore SVN Repositories in Linux Systems

undefined

Subversion is the popular version management system widely used for application developments. As a system administrator, you must know the importance of backups. So keep backup of your all svn repositories on local server as well as on remote system. This article will help you to backup and restore svnRead More

How To SetUp Time Synchronization (NTP) Server on Debian Linux Systems

undefined

For System Administrator managing huge number of systems on their LAN. It is best practice to set up your own NTP server and synchronize time of all LAN system from it. Main NTP server will synchronize its time from public NTP servers. This article will help you to Setup timeRead More

How to Harden and Secure SSH for Improved Security on Linux Systems

undefined

With the sudden rise in SSH brute force attacks, securing SSH is more important than ever. In a shared hosting environment, you options are somewhat limited, but if you have a well defined user group, you can really lock down SSH such that brute-force attacks are no longer a threat.Read More

How To Protect SSH/FTP using Fail2ban on CentOS/RHEL Linux Systems

undefined

Fail2ban is very useful application for you, if you are managing security of server, or you are running your own vps or physical server. Fail2ban scan log files created on system and has ability to ban ips which found malicious based on configuration rules. We can use it for monitoringRead More

How to Install and Configure SVN Server on CentOS Linux Systems

undefined

Subversion (SVN) is an open source version control system. It helps you keep track of a collection of files and folders. Any time you change, add or delete a file or folder that you manage with Subversion, you commit these changes to your Subversion repository, which creates a new revisionRead More

Memcached Performance Tuning – Part 1

undefined

Memcached is often threated as a zero-configuration system. This isn’t quite true. Proper configuration to the hardware and client application’s behavior can significantly improve overall performance. Memcached is pretty simple, and there is a handful of statistics. You only need to know a bit of internals to use it. Luckily,Read More

How to Install and Configure Memcached on CentOS 7 Linux Systems

undefined

Introduction Memcached is a free, open source, high-performance, in-memory object cache system widely used in dynamic web applications to reduce load on database systems and as a fast datastore for frequency accessed data. It has a simple design which promotes quick deployment and ease of development. Memcached stores data asRead More