Archives

now browsing by author

 

How to Add Protective Measures Against SSH Attacks on Linux Systems

undefined

Earlier this week, I noted that ssh brute force attacks are on the rise. These attacks attempt to guess SSH passwords by repeatedly accessing your server. Often these attacks can disrupt SSH services. As I noted yesterday, you can use IPtables to rate-limit or throttle ssh connections. Today, I wantRead More

How to Backup and Restore SVN Repositories in Linux Systems

undefined

Subversion is the popular version management system widely used for application developments. As a system administrator, you must know the importance of backups. So keep backup of your all svn repositories on local server as well as on remote system. This article will help you to backup and restore svnRead More

What is Active FTP vs Passive FTP (A Definitive Explanation)

undefined

FTP ( File Trasnfer Protocal ) is TCP based service. FTP is widely use for transferring files over network. There are various ftp servers available to use like vsftpd, proftpd, pureftpd etc. FTP uses two different ports – 1. Port 20 is used for data port, But the data portRead More

How To SetUp Time Synchronization (NTP) Server on Debian Linux Systems

undefined

For System Administrator managing huge number of systems on their LAN. It is best practice to set up your own NTP server and synchronize time of all LAN system from it. Main NTP server will synchronize its time from public NTP servers. This article will help you to Setup timeRead More

How to Harden and Secure SSH for Improved Security on Linux Systems

undefined

With the sudden rise in SSH brute force attacks, securing SSH is more important than ever. In a shared hosting environment, you options are somewhat limited, but if you have a well defined user group, you can really lock down SSH such that brute-force attacks are no longer a threat.Read More

How To Protect SSH/FTP using Fail2ban on CentOS/RHEL Linux Systems

undefined

Fail2ban is very useful application for you, if you are managing security of server, or you are running your own vps or physical server. Fail2ban scan log files created on system and has ability to ban ips which found malicious based on configuration rules. We can use it for monitoringRead More

How to Install and Configure SVN Server on CentOS Linux Systems

undefined

Subversion (SVN) is an open source version control system. It helps you keep track of a collection of files and folders. Any time you change, add or delete a file or folder that you manage with Subversion, you commit these changes to your Subversion repository, which creates a new revisionRead More

Memcached Performance Tuning – Part 1

undefined

Memcached is often threated as a zero-configuration system. This isn’t quite true. Proper configuration to the hardware and client application’s behavior can significantly improve overall performance. Memcached is pretty simple, and there is a handful of statistics. You only need to know a bit of internals to use it. Luckily,Read More

How to Install and Configure Memcached on CentOS 7 Linux Systems

undefined

Introduction Memcached is a free, open source, high-performance, in-memory object cache system widely used in dynamic web applications to reduce load on database systems and as a fast datastore for frequency accessed data. It has a simple design which promotes quick deployment and ease of development. Memcached stores data asRead More

Install Memcached (Caching Server) on RHEL/CentOS 6/5 Linux Systems

undefined

This article shows how to install Memcached Server on RHEL 6.3/6.2/6.1/6/5.8/5.6, CentOS 6.3/6.2/6.1/6/5.8/5.6 and Fedora 17,16,15,14,13,12 using package manager called YUM. By default, Memcached program not available under Linux, you need to enable and install third party repository called EPEL to install Memcached program on Linux. The EPEL repository isRead More