If the server is placed in network behind firewall and outgoing traffic is blocked by firewall, the only chance to install new packages from remote repo is through proxy (if that exists).
Do you want to display cool or funny banners in your Linux console? Try two commands, which generate banners: banner or figlet.
Logical Volume Manager (LVM) is a device mapper target that provides logical volume management for the Linux kernel. LVM allows to create Logical Volumes from underlying Physical Hard Disks (Physiacal Volumes). Logical Volumes can be easily extended and shrunk according […]
If you suspect that your system was compromised and files and/or their permissions were modified by the intruder, you can use AIDE to check your file system against some modifications. AIDE (Advanced Intrusion Detection Environment) is a file integrity checker […]
Sometimes we need to know what is our system configuration (CPU, RAM, network interfaces, etc…), but we don’t want to open computer case to look what’s inside or even don’t have such possibility, especially when we are connected to remote […]
How to verify, if cable is connected to the interface in Linux? How to verify physical connection to network on interface in Linux? If you are away from the server and unable to see if ethernet cable is connected to […]
Typical OpenStack cloud setup consists of more than one node (usually one Controller node and several Compute nodes), which requires lot of physical computers / servers available to perform the installation. This complicates the situation, especially if we need to […]
SELinux (Security Enhanced Linux) is an additional method of Linux system protection. It’s a group of security contexts that determine which process can access which files, directories, ports, etc… SELinux has three modes: Enforcing: SELinux protects files, directories, ports against […]
You can compare two text files in Linux using the following command-line tools: – diff – vim / vimdiff These tools are already installed “out-of-the-box” in most Linux distributions.
Secure Shell (SSH), besides standard password authentication, gives us the possibility to authenticate using private – public key relation. This allows us access remote systems without typing the password each time we want to connect and the connection is still […]