What your choice of Linux distribution says about you
Many Linux newbies — or wanna-be newbies — get hung up over the choice of their…
Many Linux newbies — or wanna-be newbies — get hung up over the choice of their…
The set of instructions below worked quickly and easily for your Linux Server You must be…
>Server security is as important as network security because servers often hold a great deal of…
Our Frequently Asked Questions on Linux gives you insight on what you can expect when choosing…
This tutorial is for system admins and will run you through how to Detect and Clean…
PEAR stands for ‘PHP Extension and Application Repository’ and has been slowly building itself over the…
Disguising your server signature is always a good idea as you wont reveal the operating system…
Simple Shell commands for Informational purposes
Simple Shell commands for filesystem
RKHunter also known as RootKit Hunter is a scanning tool to ensure you for about 99.9%…
chkrootkit: shell script that checks system binaries for rootkit modification.
BFD is a modular shell script for parsing applicable logs and checking for authentication failures.
Telnet should be disabled, and you should use SSH. Telnet sends password in plain text, and…
SSH Protocol 1 based systems are facing many automated “root kits”. As a result to step…
Logwatch is a customizable log analysis system. Logwatch parses through your system’s logs for a given…
A managed dedicated server is either one you rent or one you co-locate where someone else…
Renting or Co-Locating a dedicated server that is not managed takes a lot of time and…
A dedicated server is a computer(server) that only runs one type of server software. The server…
Disabling root login via shh is a great way to tigthen security on your dedicated server.
This is a quick guide on adding IPs to a system manually. I would only suggest…
We’ve put together some of the more frequently used SSH commands or linux shell commands, and…