Skip to main content

Posts

Showing posts from March, 2015

Bridging Ethernet Connections - Ubuntu/Fedora

Installing bridge-utils Adept Search for bridge-utils and choose the drop-down arrow on the left. Choose "request install". Konsole: Enter this into Konsole: sudo apt-get update sudo apt-get install bridge-utils If you use sudo -i and enter your password, then you will not have to use sudo before each command. It may also save you some typing in the future. Setting up the Bridge Ensure that both (or all) of your interfaces are installed and enabled. If they are then you may proceed at this point. For a few moments, if your computer is connected to the internet then it will be disconnected until a certain point is reached. Open Konsole and use the following commands. Note that when interfaces are referenced, they refer to device names assigned by linux such as "eth0" and "eth1". Also note that myBridge is the name of the bridge that you wish to have. This can be anything, but a simple name like bridge0 or bridge1 is s...

5 Best Practices to Secure and Protect SSH

SSH ( Secure Shel l) is an open source network protocol that is used to connect local or remote Linux servers to transfer files, make remote backups, remote command execution and other network related tasks via scp or sftp between two servers that connects on secure channel over the network. SSH Server Security Tips In this article, I will show you some simple tools and tricks that will help you to tighten your ssh server security. Here you will find some useful information on how to secure and prevent ssh server from brute force and dictionary attacks . 1. DenyHosts DenyHosts is an open source log-based intrusion prevention security script for SSH servers was written in python programming language that intended to run by Linux system administrators and users to monitor and analyzes SSH server access logs for failed login attempts knows as dictionary based attacks and brute force attacks . The script works by banning IP addresses after set number of failed logi...

How to secure SSH server : Use Fail2ban on Ubuntu 14.04

Introduction While connecting to your server through SSH can be very secure, the SSH daemon itself is a service that must be exposed to the internet to function properly. This comes with some inherent risk and creates a vector of attack for would-be assailants. Any service that is exposed to the network is a potential target in this way. If you pay attention to application logs for these services, you will often see repeated, systematic login attempts that represent brute force attacks by users and bots alike. A service called fail2ban can mitigate this problem by creating rules that can automatically alter your firewall configuration based on a predefined number of unsuccessful login attempts. This will allow your server to respond to illegitimate access attempts without intervention from you. In this guide, we'll cover how to install and use fail2ban on an Ubuntu 14.04 server. Install Fail2Ban on Ubuntu 14.04 The installation process for this tool i...

VIM Editor Commands

Vim is an editor to create or edit a text file. There are two modes in vim. One is the command mode and another is the insert mode. In the command mode, user can move around the file, delete text, etc. In the insert mode, user can insert text. Changing mode from one to another From command mode to insert mode type a / A / i / I / o / O ( see details below) From insert mode to command mode type Esc (escape key) Some useful commands for VIM Text Entry Commands (Used to start text entry) a Append text following current cursor position A Append text to the end of current line i Insert text before the current cursor position I Insert text at the beginning of the cursor line o Open up a new line following the current line and add text there O Open up a new line in front of the current line and add text there The following commands are used only in the commands mode. Cursor Movement Commands h Moves the cursor one character to the left l Mov...

Difference between Windows Server 2008, 2008 SP2 and 2008 R2

1.     Windows Server 2008 and Windows Server 2008 SP2 are the same operating system, just at a different service pack level (Windows Server 2008 started at the SP1 level because it was released quite a bit after Windows Vista and SP1 was already out). 2.     Windows Server 2008 R2 is the server release of Windows 7, so it's version 6.1 of the O.S.; it introduces quite a lot of new features 3.     There are also differences at the GUI level, because WS2008R2 uses the same new GUI introduced with Windows 7 (new taskbar, etc.) 4.     The single most important point: Windows Server 2008 R2 exists only for 64-bit platforms, there's no x86 version anymore. 5.     Windows Server 2008 is based on the WindowsNT 6.0 service pack 1 kernel. Because of this the first service pack was Service pack 2 (Windows Server 2008 SP2). Windows Server 2008 R2 is also based on the WindowsNT 6.1 Kernel (It is a...