Mini-Howtos

Want to support HowtoForge? Become a subscriber!
 

Simple Hard Drive Data Recovery

Simple Hard Drive Data Recovery

After a recent brush with hard drive failure, I wanted to put together a HOWTO on how to mirror a hard drive, ignoring errors under Linux. It is critical to ensure that these commands are issued correctly, and that the right drive and device names are used. dd offers no prompting and confirmation - use with caution!

Fast way to update Bash on Debian based distributions to secure it against Shell Shock.

Fast way to update Bash on Debian based distributions to secure it against Shell Shock. 

Secure OpenVPN with two-factor authentication from WiKID on Centos 7

Secure OpenVPN with two-factor authentication from WiKID.

In a previous tutorial, we showed how to configure PAM-RADIUS to support two-factor authentication. Now, and in future tutorials, we will add remote access services to this server that will also use WiKID for two-factor authentication. In this tutorial, we will demonstrate how to leverage that setup to add two-factor authentication through radius to OpenVPN on Centos 7.

How to whitelist an IP in Fail2ban on Debian Wheezy

How to whitelist an IP in Fail2ban on Debian Wheezy

Fail2Ban is used to protect servers against brute force attacks. Fail2ban uses iptables to block attackers, so, if we want to add permanent IP address and never be blocked, we must add it in the config file.

Hybrid RAID 1 (Mirror) of RAM drive & SATA HDD Using LVM with LUKS [and systemd unit file] on Fedora Linux

Hybrid RAID 1 (Mirror) of RAM drive & SATA HDD Using LVM with LUKS [and systemd unit file] on Fedora Linux

The IT industry has a continual balance between security and usability. Within this balance, performance usually affects usability. In the realm of protecting "Data at Rest" (i.e. encryption) one may find three factors affecting performance, and therefore usabilty: The harddrive, CPU and RAM. Of these, the harddrive will always prove to be a bottleneck (yes, even with an SDD).

Free Software has a rather elegant solution for protecting Data at Rest, called Linux Unified Key Setup (LUKS). In the spirit of "Freedom 0: The freedom to run the program for any purpose." please enjoy my contribution to our collective knowledgebase of a solution to the fascinating problem of "how can we speed up encyption"?

How to configure pam-radius for WiKID Two-factor Authentication on Centos 7

Securing SSH On Centos 7 With WiKID Two-Factor Authentication

SSH offers a highly secure channel for remote administration of servers. However, if you face an audit for regulatory or business requirements, such as Visa/Mastercard PCI, you need to be aware of some potential authentication related short-comings that may cause headaches in an audit.

Linux Basics: How to Edit Files on The Shell with Nano

Linux Basics: How to Edit Files on The Shell with Nano

Nano is a fairly versatile and user-friendly text editor that is capable of being used in a fuss-free manner by the somewhat inexperienced users too, as against the more sophisticated text editors such like Emacs and Vim. While these are excellent programs, they do have a bit of a learning curve. It works seamlessly in combination with Sudo, much to the glee of end-users.

Linux Basics: How to Download Files on the Shell With Wget

Linux Basics: How to Download Files on the Shell With Wget

Wget is a popular and absolutely user-friendly free-utility command line tool primarily used for non-interactive downloading files from the web. wget helps users in manipulate downloading of huge chunks of data, multiple files, downloads of recursive nature, and protocol-based download (HTTP, HTTPS, and FTP). The following is the basic wget command syntax, though this tutorial covers all the possible download scenarios for the benefit of learners.

How to Set Up The Basic Apache Config For Virtual Hosts on CentOS 6

How to Set Up Apache Virtual Hosts on CentOS 6

Virtual Hosts are required in order to run multiple domains off a single IP address. Creating virtual host is expressly helpful for users who wish to run numerous sites using one virtual private server (VPS). Typically, each server is distinctly defined by it's domain/hostname. To the utter delight of users, there does not exist an upper limit to the number of virtual hosts that may be added to a VPS.

Linux Basics: How to Add and Delete Shell Users on CentOS

Linux Basics: How to Add and Delete Shell Users on CentOS

The process of adding and deleting shell users on a new server is a basic task every Linux user or system Administrator should know.

1
...
next page
last page