Enable Automatic Updates in Ubuntu Linux | With Ubuntu or Debian Linux it is possible to enable automatic updates. Here’s how it works!
How to login via SSH to Amazon EC2 instance | After launching a Linux Amazon EC2 instance, you can ssh in by using the private key (key pair download) provided in the AWS console. I’ll show you how! 1. In the AWS console, a key pair can be generated. Download the key pair (private key, .pem file) from the console. 2. Next, move this .pem
Install Drupal 7 in Ubuntu 12.04 | Drupal 7 is provided in Ubuntu 12.04. I’ll show you how to get it up and running! 1. Install the package drupal7: $ sudo apt-get install drupal7 2. Create the following apache site configuration file: $ sudo nano /etc/apache2/sites-available/drupal7 Alias /drupal7 “/usr/share/drupal7″ < Directory /usr/share/drupal7 > Options -Indexes FollowSymLinks MultiViews < /Directory > 3. Enable
Change sudo default password cache | sudo’s default password cache time is 5 minutes. To change the default time, it is possible to edit a setting in /etc/sudoers as desired. I’ll show you how! Edit /etc/sudoers with your desired text editor, or as standard with sudo visudo: $ sudo visudo For example, to increase the timeout to 30 minutes for user
Ubuntu Server MOTD Include Security Updates | Ubuntu Server can display outstanding package and security updates as the MOTD when logging in locally or via ssh. I’ll show you how! To enable this feature, install the following package: $ sudo apt-get install update-notifier-common The terminal output will look as below: $ ssh firstname.lastname@example.org Linux example.com 3.0.18-linode43 #1 SMP Mon Jan 30 11:44:09
Red Hat Enterprise Linux 6 Desktop Review | While mainly used as a mission critical server distribution of Linux, Red Hat also offers a Desktop Workstation version. Here is a quick review of the latest Red Hat 6.1 Workstation release! Why run RHEL Workstation for a Desktop Linux choice? If you are a small or large business, you may wish to have uniform
Prevent Postfix Brute Force | An often used attack vector is brute forcing MTA logins. While most admins watch ssh auth logs like a hawk, email auth/login logs are most often not closely watched for this sort of thing if at all. I’ll show you one way to easily prevent a Postfix brute force attack! This how-to focuses on fail2ban
Bash Tips – Return to Previous Location | Ok this is a quick one, but useful! To return to the previous working directory, simply type: cd – and hit enter. Cool!
Hardending Red Hat Linux, OS X, and Windows | The security folks at the NSA have online guides on how to secure Linux, OS X, and Windows operating systems. These are definitely worth a read of all articles even if an OS in question is not your main cup of tea. Here is the link: http://www.nsa.gov/ia/guidance/security_configuration_guides/operating_systems.shtml Page has been taken down This direct link
intoDNS.com – Check Your DNS | intoDNS is a slick web based DNS check. Check it out: http://www.intodns.com