Category: Linux

Linux Server Managment

P

PHP/MySQL Tutorial

By Graeme Merral : Open source has brought a lot more than Linux to the computing world. It has also given us PHP and MySQL. According to Graeme, PHP and MySQL are the world’s best

S

Shell Commands

Simple Shell commands for Informational purposes

S

Simple Shell Commands

Simple Shell commands for filesystem

H

How To Install RKHunter

RKHunter also known as RootKit Hunter is a scanning tool to ensure you for about 99.9% that you don’t have any rootkits, backdoors, and local exploits but running tests and e-mailing you results.

H

How To Install CHKROOTKIT

chkrootkit: shell script that checks system binaries for rootkit modification.

I

Install BFD (Brute Force Detection)

BFD is a modular shell script for parsing applicable logs and checking for authentication failures.

D

Disable Telnet Access

Telnet should be disabled, and you should use SSH. Telnet sends password in plain text, and ‘crackers/hackers’ can obtain these passwords easily compared to SSH, and then takeover your dedicated web server.

F

Force the use of SSH protocol 2

SSH Protocol 1 based systems are facing many automated “root kits”. As a result to step up the security Protcol 2 should be enabled as soon as possible.

I

Install LogWatch

Logwatch is a customizable log analysis system. Logwatch parses through your system’s logs for a given period of time and creates a report analyzing areas that you specify, in as much detail as you require.

W

What is a managed dedicated server

A managed dedicated server is either one you rent or one you co-locate where someone else is in charge of the well being of the server.

W

What do I need to know to have a dedicated server

Renting or Co-Locating a dedicated server that is not managed takes a lot of time and knowledge. You must be familiar with the operating system your dedicated server will be running on, and by familiar

W

What is a dedicated server?

A dedicated server is a computer(server) that only runs one type of server software. The server is usualy constructed or pre-configured to the customers specifications.

D

Disabling Direct Root Login (SSH)

Disabling root login via shh is a great way to tigthen security on your dedicated server.

.

.htaccess Tutorial

In this tutorial you will find out about the .htaccess file and the power it has to improve your website. Although .htaccess is only a file, it can change settings on the servers and allow

A

Adding an IP address to your Linux Server

This is a quick guide on adding IPs to a system manually. I would only suggest it if you are not using a control panel, such as cpanel, that has a feature to adds ips.

C

Common SSH Commands and Linux Shell Commands

We’ve put together some of the more frequently used SSH commands or linux shell commands, and organized them by name so you can easily find a command, their description and how to use it. This

H

How can I change permissions on my cgi-bin files using FTP?

You can use your FTP software to set the proper permissions for your scripts in your cgi-bin.

C

CHMOD Commands

Chmod command sets UNIX file permissions. You can set the permissions with the help of your FTP client.