Archives
now browsing by author
How to Add Protective Measures Against SSH Attacks on Linux Systems
Earlier this week, I noted that ssh brute force attacks are on the rise. These attacks attempt to guess SSH passwords by repeatedly accessing your server. Often these attacks can disrupt SSH services. As I noted yesterday, you can use IPtables to rate-limit or throttle ssh connections. Today, I wantRead More
How to Backup and Restore SVN Repositories in Linux Systems
Subversion is the popular version management system widely used for application developments. As a system administrator, you must know the importance of backups. So keep backup of your all svn repositories on local server as well as on remote system. This article will help you to backup and restore svnRead More
What is Active FTP vs Passive FTP (A Definitive Explanation)
FTP ( File Trasnfer Protocal ) is TCP based service. FTP is widely use for transferring files over network. There are various ftp servers available to use like vsftpd, proftpd, pureftpd etc. FTP uses two different ports – 1. Port 20 is used for data port, But the data portRead More
How To SetUp Time Synchronization (NTP) Server on Debian Linux Systems
For System Administrator managing huge number of systems on their LAN. It is best practice to set up your own NTP server and synchronize time of all LAN system from it. Main NTP server will synchronize its time from public NTP servers. This article will help you to Setup timeRead More
How to Harden and Secure SSH for Improved Security on Linux Systems
With the sudden rise in SSH brute force attacks, securing SSH is more important than ever. In a shared hosting environment, you options are somewhat limited, but if you have a well defined user group, you can really lock down SSH such that brute-force attacks are no longer a threat.Read More
How To Protect SSH/FTP using Fail2ban on CentOS/RHEL Linux Systems
Fail2ban is very useful application for you, if you are managing security of server, or you are running your own vps or physical server. Fail2ban scan log files created on system and has ability to ban ips which found malicious based on configuration rules. We can use it for monitoringRead More
How to Install and Configure SVN Server on CentOS Linux Systems
Subversion (SVN) is an open source version control system. It helps you keep track of a collection of files and folders. Any time you change, add or delete a file or folder that you manage with Subversion, you commit these changes to your Subversion repository, which creates a new revisionRead More
Memcached Performance Tuning – Part 1
Memcached is often threated as a zero-configuration system. This isn’t quite true. Proper configuration to the hardware and client application’s behavior can significantly improve overall performance. Memcached is pretty simple, and there is a handful of statistics. You only need to know a bit of internals to use it. Luckily,Read More
How to Install and Configure Memcached on CentOS 7 Linux Systems
Introduction Memcached is a free, open source, high-performance, in-memory object cache system widely used in dynamic web applications to reduce load on database systems and as a fast datastore for frequency accessed data. It has a simple design which promotes quick deployment and ease of development. Memcached stores data asRead More
Install Memcached (Caching Server) on RHEL/CentOS 6/5 Linux Systems
This article shows how to install Memcached Server on RHEL 6.3/6.2/6.1/6/5.8/5.6, CentOS 6.3/6.2/6.1/6/5.8/5.6 and Fedora 17,16,15,14,13,12 using package manager called YUM. By default, Memcached program not available under Linux, you need to enable and install third party repository called EPEL to install Memcached program on Linux. The EPEL repository isRead More