Tagged articles
335 articles
Page 4 of 4
DevOps
DevOps
Jan 7, 2018 · Information Security

Resolving Git Authentication Failures on Windows Using Credential Manager and SSH Keys

This guide explains two methods to overcome Git authentication errors on Windows—configuring Git Credential Manager for Basic authentication and generating SSH keys—to securely connect to TFS/VSTS Git repositories, including required commands, setup steps, and credential storage details.

AuthenticationCredential ManagerGit
0 likes · 6 min read
Resolving Git Authentication Failures on Windows Using Credential Manager and SSH Keys
Efficient Ops
Efficient Ops
Aug 31, 2017 · Operations

Boost Your Linux Ops: Master Xargs, Background Jobs, and Real‑Time Monitoring

This guide walks you through essential Linux operations techniques—including practical xargs usage, running scripts in the background with nohup, identifying high‑memory and high‑CPU processes, monitoring multiple logs with multitail, continuous ping logging, checking TCP connections, spotting top IPs, and SSH port forwarding—providing ready‑to‑use commands and examples.

SSHmultitailnohup
0 likes · 10 min read
Boost Your Linux Ops: Master Xargs, Background Jobs, and Real‑Time Monitoring
ITPUB
ITPUB
Jul 19, 2017 · Information Security

Essential Linux Hardening: Minimalism, Port Tweaks, and Kernel Optimizations

This guide walks through practical Linux hardening steps—including minimal installation, SSH port changes, sudo privilege tailoring, extensive kernel sysctl tuning, firewall adjustments, system version hiding, file protection, and package installation strategies—to boost security and performance while keeping the system lean.

SSHSudoSystem Hardening
0 likes · 6 min read
Essential Linux Hardening: Minimalism, Port Tweaks, and Kernel Optimizations
MaGe Linux Operations
MaGe Linux Operations
Apr 20, 2017 · Operations

10 Lazy Sysadmin Tricks to Boost Linux Efficiency in Minutes

This article presents ten practical Linux system‑administration tricks—from unmounting a stuck DVD and recovering a frozen screen to using SSH tunnels for VNC, resetting root passwords, measuring bandwidth with iperf, and gathering system information—each designed to save time and improve efficiency for busy administrators.

SSHVNCperformance
0 likes · 20 min read
10 Lazy Sysadmin Tricks to Boost Linux Efficiency in Minutes
MaGe Linux Operations
MaGe Linux Operations
Apr 15, 2017 · Information Security

Boost Your Linux Security: Essential Commands and Best Practices

This article provides a comprehensive, step‑by‑step guide to hardening a Linux system, covering console restrictions, password policies, sudo alerts, SSH tuning, Tripwire intrusion detection, firewalld and iptables management, compiler restrictions, immutable files, SELinux auditing with aureport, and the sealert tool.

HardeningSELinuxSSH
0 likes · 14 min read
Boost Your Linux Security: Essential Commands and Best Practices
ITPUB
ITPUB
Jan 30, 2017 · Information Security

How to Harden a Linux Host: BIOS Protection, Disk Encryption, SSH Hardening and More

This guide outlines practical techniques to improve Linux host security, covering BIOS password setup, disk encryption, boot directory protection, USB disabling, system updates, package cleanup, port scanning, SSH hardening, SELinux activation, network parameter tuning, password policies, and file permission hardening.

HardeningSELinuxSSH
0 likes · 14 min read
How to Harden a Linux Host: BIOS Protection, Disk Encryption, SSH Hardening and More
MaGe Linux Operations
MaGe Linux Operations
Nov 14, 2016 · Operations

Master Ansible: From Basics to Advanced Automation without Agents

This comprehensive guide introduces Ansible, explains its agentless architecture, core components, installation, SSH key setup, inventory configuration, essential commands, and common modules, providing a practical roadmap for automating system administration and deployment tasks.

AnsibleAutomationConfiguration Management
0 likes · 17 min read
Master Ansible: From Basics to Advanced Automation without Agents
MaGe Linux Operations
MaGe Linux Operations
Aug 23, 2016 · Big Data

Step-by-Step Guide to Building a Hadoop Cluster on CentOS 6.5

This article provides a comprehensive, hands‑on tutorial for setting up a Hadoop 2.6.4 cluster on a CentOS 6.5 development server, covering SSH password‑less login, user/group creation, DNS configuration, JDK installation, environment variables, Hadoop installation, HDFS and YARN configuration, and troubleshooting native library warnings.

Big DataCentOSCluster Setup
0 likes · 12 min read
Step-by-Step Guide to Building a Hadoop Cluster on CentOS 6.5
DevOps
DevOps
Jul 22, 2016 · Information Security

How to Connect to TFS/VSTS Git Repositories via SSH

This guide explains how to generate SSH keys, upload the public key to TFS/VSTS, and clone repositories over SSH, providing a secure, password‑less workflow for Git on any operating system.

SSH
0 likes · 5 min read
How to Connect to TFS/VSTS Git Repositories via SSH
ITPUB
ITPUB
Jul 22, 2016 · Information Security

How Mining Trojans Hijack Linux Servers: Sample 101 Analysis and Defense

The article examines a cryptocurrency mining trojan (sample 101), detailing its process list, malicious startup scripts, SSH key injection, service deployment, removal steps, and offers practical defense measures against such malware infections.

Cryptocurrency MiningLinuxSSH
0 likes · 7 min read
How Mining Trojans Hijack Linux Servers: Sample 101 Analysis and Defense
ITPUB
ITPUB
Apr 19, 2016 · Information Security

How to Disable Root SSH Login on Linux for Better Security

This guide explains why allowing root SSH access is risky, shows how to edit the sshd_config file to set PermitRootLogin no, restart the SSH service, verify the restriction, and optionally allow specific users or re‑enable root login when needed.

LinuxRootLoginSSH
0 likes · 5 min read
How to Disable Root SSH Login on Linux for Better Security
MaGe Linux Operations
MaGe Linux Operations
May 18, 2015 · Information Security

How to Set Up Password‑Free SSH Login Between Two Linux Hosts

Learn step‑by‑step how to configure passwordless SSH from a user on one Linux host to another by generating RSA keys, copying the public key, creating the necessary .ssh directory, and troubleshooting common permission issues.

Public Key AuthenticationSSHSystem Administration
0 likes · 3 min read
How to Set Up Password‑Free SSH Login Between Two Linux Hosts
MaGe Linux Operations
MaGe Linux Operations
Apr 15, 2015 · Operations

Why Your SSH Loop Stops After One Host—and How to Fix It

Learn why a Bash script that reads IPs from a file and uses SSH in a while loop only processes the first host, and discover two reliable solutions—switching to a for loop or adding the -n option to SSH—to ensure all servers are queried correctly.

/loopAutomationBash
0 likes · 4 min read
Why Your SSH Loop Stops After One Host—and How to Fix It
Qunar Tech Salon
Qunar Tech Salon
Apr 14, 2015 · Operations

Running Oracle Installation Remotely on Ubuntu Using SSH X11 Forwarding

To install Oracle or run other graphical applications on a remote Ubuntu machine, you can leverage X11 forwarding over SSH by enabling X11 support in sshd_config, connecting with the -X option, and launching GUI programs such as xeyes or Firefox, eliminating the need for a local GUI.

SSHUbuntuoracle-installation
0 likes · 3 min read
Running Oracle Installation Remotely on Ubuntu Using SSH X11 Forwarding
MaGe Linux Operations
MaGe Linux Operations
Sep 12, 2014 · Information Security

Secure Your New Ubuntu Server in Minutes: SSH, Firewall, and Fail2Ban

This step‑by‑step guide shows how to harden a freshly installed Ubuntu 12.04 LTS server by creating a non‑root user, disabling root SSH access, configuring SSH keys, applying system updates, setting up iptables firewall rules, and installing Fail2Ban to automatically block malicious login attempts.

Fail2banLinuxSSH
0 likes · 13 min read
Secure Your New Ubuntu Server in Minutes: SSH, Firewall, and Fail2Ban
MaGe Linux Operations
MaGe Linux Operations
Sep 5, 2014 · Information Security

Secure SSH with Google Authenticator: Step-by-Step Two-Factor Setup

This tutorial explains how to protect SSH logins by installing Google Authenticator, generating a secret key, configuring PAM and sshd, and using an Android device to provide time‑based one‑time passwords, complete with installation commands, troubleshooting tips, and verification steps.

Google AuthenticatorLinuxSSH
0 likes · 8 min read
Secure SSH with Google Authenticator: Step-by-Step Two-Factor Setup
MaGe Linux Operations
MaGe Linux Operations
Aug 15, 2014 · Operations

Automate Multi-Server Commands with Expect: A Quick Guide

This article introduces the Expect scripting language, an extension of Tcl, and provides a concise example that automates running commands on multiple Linux servers by handling interactive prompts such as password entry, along with usage instructions and installation tips for CentOS and Ubuntu.

LinuxSSHexpect
0 likes · 3 min read
Automate Multi-Server Commands with Expect: A Quick Guide
MaGe Linux Operations
MaGe Linux Operations
Jul 23, 2014 · Operations

25 Essential SSH Commands Every Sysadmin Should Master

This article presents a curated list of 25 powerful OpenSSH commands, covering key techniques such as password‑less login, port forwarding, remote file comparison, SSHFS mounting, persistent connections, bandwidth control, and advanced tunneling, all aimed at boosting Linux system administration efficiency.

LinuxRemote accessSSH
0 likes · 13 min read
25 Essential SSH Commands Every Sysadmin Should Master
MaGe Linux Operations
MaGe Linux Operations
Jun 23, 2014 · Information Security

Essential Linux Server Hardening: Disable Root SSH, Change Port, and More

This guide outlines practical Linux server hardening steps—including disabling root SSH login, changing the default SSH port, using SCP over FTP, installing denyhosts, managing file permissions, employing dedicated service accounts, and safely obtaining tools like PuTTY—to significantly improve system security.

DenyHostsLinuxPutty
0 likes · 5 min read
Essential Linux Server Hardening: Disable Root SSH, Change Port, and More
Baidu Tech Salon
Baidu Tech Salon
Jun 20, 2014 · Operations

Command Line Tips and Tricks from Linux Voice

Linux Voice’s roundup showcases practical and playful command‑line tricks—from using elinks for quick web checks and Wikipedia lookups to witty commands like sl, cowsay, and humorous “cat” errors—while stressing bash scripting, SSH password‑less login, responsible root use, and the ongoing debate over CLI versus GUI for everyday tasks.

BashSSHSysadmin
0 likes · 6 min read
Command Line Tips and Tricks from Linux Voice