clamav Signatures not Updating Ubuntu Linux | Clamav will sometimes have trouble downloading updates for some reason or another. I’ll show you how to fix this in Ubuntu Linux! First, stop clamav: $ sudo /etc/init.d/clamav-daemon stop $ sudo /etc/init.d/clamav-freshclam stop Next we are going to manually download the latest signatures from clamav’s website and place them into the proper location in Ubuntu.
How to Manually Edit ufw Rules on Ubuntu Linux | ufw is the great command line app for managing iptables in Ubuntu. While any changes should use the ufw command, it is possible to rather manually edit user created ufw rules in cases where that might be desirable. The file location is: /lib/ufw/user.rules For ipv6 rules, the file is: /lib/ufw/user6.rules As with iptables, rules are
Ubuntu Server MOTD Include Security Updates | Ubuntu Server can display outstanding package and security updates as the MOTD when logging in locally or via ssh. I’ll show you how! To enable this feature, install the following package: $ sudo apt-get install update-notifier-common The terminal output will look as below: $ ssh email@example.com Linux example.com 3.0.18-linode43 #1 SMP Mon Jan 30 11:44:09
What’s New in Ubuntu Server 12.04 LTS | Ubuntu Server 12.04 will be released on 26 April 2012. Ubuntu 12.04 is supported with security updates until 2017 which makes Ubuntu LTS an attractive choice for use as a server. At the time of this blog post, 12.04 is still in Alpha 1 so many changes are still occurring. However, I will give you
ufw Allow From Specific IP on Specific Port | ufw is the friendly command line firewall utility in Debian and Ubuntu. I’ll show you how to create a specific rule syntax for allowing traffic in from a specific ip on a specific port. Say for example you want to allow traffic from 192.168.1.215 on udp port 88. Here is the command: $ sudo ufw
Protect Against Brute Force with ufw | ufw is the super easy firewall interface featured in Ubuntu and also the latest Debian. Somewhat like fail2ban, one feature of ufw is built-in rate limiting to protect against brute force attacks. While this could be used on any port, a common use is on port 22 to protect against ssh dictionary attacks or other