Uncategorized
now browsing by category
Additional Yum Repositories for CentOS/RHEL 7/6/5
YUM ( Yellowdog Updater, Modified ) is an command-line package-management utility for RPM based Linux systems, It has been released under the GNU General Public License. Yum is useful for rpms which have dependencies, Yum searches for all dependencies of any RPM in all available repositories. Below list contains topRead More
Block SSH Brute Force Attacks with IPTables on Linux Systems
Detecting a SSH Brute Force Attack If you are under a SSH brute force attack, you will likely see something like this in your logs. Jan 26 03:46:02 host sshd[22731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.39.22.154 Jan 26 03:46:02 host sshd[22731]: pam_succeed_if(sshd:auth): error retrieving information about userRead More
How to Add Protective Measures Against SSH Attacks on Linux Systems
Earlier this week, I noted that ssh brute force attacks are on the rise. These attacks attempt to guess SSH passwords by repeatedly accessing your server. Often these attacks can disrupt SSH services. As I noted yesterday, you can use IPtables to rate-limit or throttle ssh connections. Today, I wantRead More
How to Backup and Restore SVN Repositories in Linux Systems
Subversion is the popular version management system widely used for application developments. As a system administrator, you must know the importance of backups. So keep backup of your all svn repositories on local server as well as on remote system. This article will help you to backup and restore svnRead More
How To SetUp Time Synchronization (NTP) Server on Debian Linux Systems
For System Administrator managing huge number of systems on their LAN. It is best practice to set up your own NTP server and synchronize time of all LAN system from it. Main NTP server will synchronize its time from public NTP servers. This article will help you to Setup timeRead More
How to Harden and Secure SSH for Improved Security on Linux Systems
With the sudden rise in SSH brute force attacks, securing SSH is more important than ever. In a shared hosting environment, you options are somewhat limited, but if you have a well defined user group, you can really lock down SSH such that brute-force attacks are no longer a threat.Read More
How To Protect SSH/FTP using Fail2ban on CentOS/RHEL Linux Systems
Fail2ban is very useful application for you, if you are managing security of server, or you are running your own vps or physical server. Fail2ban scan log files created on system and has ability to ban ips which found malicious based on configuration rules. We can use it for monitoringRead More
How to Install and Configure SVN Server on CentOS Linux Systems
Subversion (SVN) is an open source version control system. It helps you keep track of a collection of files and folders. Any time you change, add or delete a file or folder that you manage with Subversion, you commit these changes to your Subversion repository, which creates a new revisionRead More
Memcached Performance Tuning – Part 1
Memcached is often threated as a zero-configuration system. This isn’t quite true. Proper configuration to the hardware and client application’s behavior can significantly improve overall performance. Memcached is pretty simple, and there is a handful of statistics. You only need to know a bit of internals to use it. Luckily,Read More
How to Install and Configure Memcached on CentOS 7 Linux Systems
Introduction Memcached is a free, open source, high-performance, in-memory object cache system widely used in dynamic web applications to reduce load on database systems and as a fast datastore for frequency accessed data. It has a simple design which promotes quick deployment and ease of development. Memcached stores data asRead More