11 articles Linux System Administration

SSH Hardening Techniques


SSH Hardening Techniques These are the top practices to harden ssh. In this article I am going to list the best and most important open ssh server security practices. SSH protocol is the best option when it comes to remote login, making backups, remote file transfer and so on. It is a must have on…

How To Use Public Key Authentication Instead Of Password


Password Login Belongs To The Past Public key authentication is an easier and more reliable compared to the old- fashioned password-based login. Keys are basically less prone to brute-force attacks. If you want to force users to use keys add the line in the /etc/sshd/sshd_condig Disable PasswordAuthentication

How To Install Software Packages in Linux


How to install and remove software packages in Linux The scope of today’s article is installing and removing certain software packages in Linux using both high and low level package management tools. Installing software packages, including updates, is one of the most common tasks every system administrator performs. The main reason behind this is that…

Restart Start Stop Mysqld From The Terminal in Linux


You could need to restart MySQL server after installing, upgrading, or making some changes in my.cnf file in Linux. The quickest way to this is by typing on the command line terminal. No fancy graphic interface. MySQL Server Restart General Syntax The syntax is as follows. On the Linux or OS X type the following on…

How to change ownership of files with chown in linux


File (directory) ownership is the foundations of every operating system. This post will teach you how to change file(s) ownership in Linux using the command chown. There are different scenarios when you would need to change the ownership of a file using either chown or chgrp. Note: you can change group ownership with the command…

  • Page 1 of 2
  • 1
  • 2