Found 1436 Articles for Linux

Securing SSH, Setting Hostname and Enabling Network Services

Ayush Singh
Updated on 01-Aug-2023 17:35:02

34 Views

To secure SSH, begin by altering the default SSH port to a non-standard one, employing a solid secret word or key-based verification, and debilitating root login. Furthermore, execute firewall rules to permit only trusted IP addresses to associate. Another option is to set the hostname to an interesting and identifiable title to organise administration. At last, empower fundamental arrangement administrations such as firewalls, interruption discovery frameworks, and programmed security upgrades to guarantee continuous security. These measures altogether improve the security of the SSH server, making it less vulnerable to unauthorised access and potential assaults. Methods Used Normal approach ... Read More

Secure ProFTPD Connections Using TLS/SSL Protocol on RHEL/CentOS 7

Ayush Singh
Updated on 01-Aug-2023 17:31:39

119 Views

Secure ProFTPD Associations Utilising the TLS/SSL Convention on RHEL/CentOS 7 includes executing Transport Layer Security (TLS) and Secure Attachment Layer (SSL) encryption for secure information transmission over ProFTPD, a well-known FTP server programme. By designing ProFTPD to utilise TLS or SSL, the communication between the FTP client and server is scrambled, guaranteeing privacy and judgement of the information being exchanged. This security degree secures touchy data, such as login qualifications, from being accessed or altered by unauthorised people. TLS/SSL certificates are used to set up secure associations and confirm the server, building trust between the client and the FTP server. ... Read More

Working and components of Linux GUI with Examples

Kunal Verma
Updated on 01-Aug-2023 17:47:53

441 Views

Abstract Users can communicate with the system through an interface known as a GUI, or graphic user interface. Operating a GUI is a rather simple process. The activities are performed in the interface and are used as input before being delivered as a command to the system, which eventually ends the work. Working of Linux GUI A graphical user interface (GUI) is a way for users to communicate visually with a computer system using windows, icons, or images. The operating system's kernel is its beating heart, while the graphical user interface provided by the X Window System, also referred to ... Read More

Secure Files/Directories using ACLs (Access Control Lists) in Linux

Ayush Singh
Updated on 01-Aug-2023 17:30:02

98 Views

ACLs (Access Control Lists) in Linux give an adaptable and granular way to secure records and catalogues. With ACLs, authorizations can be set for individuals, clients, and bunches beyond the conventional proprietor, bunch, and others. This permits fine-grained control over access rights. By utilising commands like "setfacl" and "getfacl, " chairmen can characterise particular consents, such as perused, typed in, and executed, for numerous clients or bunches at the same time. ACLs upgrade security by empowering chairmen to confine or allow access to particular assets, guaranteeing that, as it were, authorised people or bunches can connect with touchy records and ... Read More

How Are Linux PIDs Generated?

Kunal Verma
Updated on 01-Aug-2023 17:42:51

63 Views

Following the system's interpretation of each command, a separate process is established to carry out the command. This new process is assigned a distinct process identification number (PID). To keep track of each process's current state, the system uses the PID. Note − Linux commands are case-sensitive. Process Table The process table in Linux is just a data structure in a computer's RAM like it is in almost every other operating system. It contains details about the processes that the OS is currently managing. This data contains broad details about each procedure. Process Id Process Owner Process Priority Environment ... Read More

How to Monitor Disk IO in a Linux System

Kunal Verma
Updated on 01-Aug-2023 17:44:30

229 Views

Abstract Disk monitoring is an important task to perform while maintaining a linux system. Essentially, getting data back from the disk costs time. As a result, the disk I/O subsystem is considered the slowest part and can slow down the whole system. Checking disc performance is crucial as a result. We must determine which process is waiting for the I/O request to complete and determine whether there is a bottleneck and what is causing it. To examine the disc I/O performance in Linux systems, we'll learn how to use tools like iostat, iotop.. iotop installation in Linux It is readily ... Read More

Secure Apache with Let\'s Encrypt Certificate on Rocky Linux

Ayush Singh
Updated on 01-Aug-2023 17:27:05

137 Views

To secure Apache with a Let's Encrypt certificate on Rough Linux, directors can guarantee secure communication over HTTPS. By getting and introducing a Let's encrypt certificate, Apache can encrypt information transmission, upgrading security and ensuring delicate data. This preparation includes designing Apache to utilise the certificate, empowering HTTPS for the site, and guaranteeing that all communication between the server and clients is encrypted. Let's encrypt certificates that are trusted by major browsers, giving a cost-effective and broadly recognised arrangement for securing Apache web servers on Rough Linux. Methods Used Obtaining a let’s encrypt certificate Configuring Apache Obtaining a ... Read More

How to List the Last Five Modified Files in Linux?

Kunal Verma
Updated on 01-Aug-2023 17:43:49

5K+ Views

In Linux, it is often necessary to find out the most recently modified files for various reasons, such as troubleshooting or auditing purposes. Listing the last five modified files is a common requirement that can be achieved using various Linux commands. In this article, we will explore some of the methods to list the last five modified files in Linux. Note − Linux commands are case-sensitive. Using ls Command The ls command is one of the most commonly used commands in Linux to list files and directories. We can use the ls command to list the files in a directory ... Read More

Scrot: A Command Line Tool to Take Desktop/Server Screenshots Automatically in Linux

Ayush Singh
Updated on 01-Aug-2023 17:25:11

135 Views

Scrot is a command-line device in Linux that empowers clients to capture desktop or server screenshots. By executing basic commands, clients can take screenshots of their whole desktop or particular districts with exact control. Scrot offers different alternatives for capturing screenshots, such as setting a delay for some time recently captured, selecting the yield record organisation, and indicating the capacity area. With its ease of use and adaptability, Scrot streamlines the method of taking screenshots in Linux, whether for documentation, investigating, or sharing visual data. It gives a helpful and effective way to capture and spare screen pictures straightforwardly from ... Read More

Linux Process States

Kunal Verma
Updated on 01-Aug-2023 17:45:44

1K+ Views

Abstract We'll learn about Linux process states in this article. We'll study each of the five states in which a Linux process can be at different stages in its life cycle. There are five states of a Linux process − Running & Runnable Stopped Uninterruptable Sleep Zombie Interruptable Sleep There is a clear reason for each of the process states which are mentioned above to exist. Having a thorough understanding of these states can be very helpful for debugging issues like resource exhaustion or out-of-control process production. This understanding is much more important if one needs to know ... Read More

Advertisements