Linux

Want to support HowtoForge? Become a subscriber!
 

How to find outdated joomla versions on your server to reduce the risk of being hacked

Today I want to focus on a topic that can lead to huge problems of hacked accounts, spam mailings etc.: Outdated Joomla installations on your server.

Of course, this is valid for other software, too. The mentioned method should work in a similar way for other software. Since Joomla is widely spread throughout the internet, especially on shared hosting systems CMS (Content Management System), this howto will only cover Joomla so far.

How To Set Up Multi-Master Replication Using Tungsten And MySQL-Proxy For MySQL High Availability On Ubuntu 10.04.3 LTS

How To Set Up Multi-Master Replication Using Tungsten And MySQL-Proxy For MySQL High Availability On Ubuntu 10.04.3 LTS

This tutorial is based on my experience setting up Tungsten Replicator and MySQL-Proxy for a client's production setup.

How To Set Up Kojoney SSH Honeypot On CentOS 5.5

How To Set Up Kojoney SSH Honeypot On CentOS 5.5

Kojoney is a low level interaction honeypot that emulates an SSH server. The daemon is written in Python using the Twisted Conch libraries. In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated, (un)protected, and monitored, and which seems to contain information or a resource of value to attackers. This tutorial shows how you can compile and install updated version of Kojoney on CentOS 5.5 server.

Boot Linux Over HTTP With netboot.me

Boot Linux Over HTTP With netboot.me

This tutorial shows how you can boot Linux over HTTP with netboot.me. All that users need is Internet connectivity and a small program (gpxe) to boot the machine. This gpxe program provides network booting facility. netboot.me allows you to boot into the following distributions: Debian, Fedora, OpenSUSE, and Ubuntu. netboot.me provides gpxe images for USB sticks, CDs, and also for floppies, i.e., you can boot from a USB sticks, a CD, or a floppy.

How To Defend slowloris DDoS With mod_qos (Apache2 On Debian [Lenny])

How To Defend slowloris DDoS With mod_qos (Apache2 On Debian [Lenny])

mod_qos gives some fine-grained opportunities to scale the number of used connections and to defend an attack according to bandwidth limits. Unfortunately it is only available as source-package and there are many possible settings, wich might be hard to setup for this special case. So I provide the way that helped me.

Installing ehcp (Easy Hosting Control Panel) On Any Debian Or Apt-Get Based Distro, Including Ubuntu

Installing ehcp (Easy Hosting Control Panel) On Any Debian Or Apt-Get Based Distro, Including Ubuntu

In this tutorial I will show you howto install ehcp on any debian based distro, or any distro that has apt-get support. ehcp stands for Easy Hosting Control Panel. It may be used by anyone wanting to host multiple domains in his dedicated/vps server. It is a hosting control panel under development.

How To Utilize Your New Multimedia Keyboard Under Linux

How To Utilize Your New Multimedia Keyboard Under Linux

Xbindkeys is a program that allows you to launch shell commands with your keyboard or your mouse under X Window. It links commands to keys or mouse buttons, using its configuration file. It does not depend on the window manager and can capture all keyboard keys.

Create Users And Change Passwords With A Bash Script

Create Users And Change Passwords With A Bash Script

These two scripts are very important for the system admin who regularly works with mail servers and somehow forgets to backup his system username and password! Let’s say somehow we lost the usernames and passwords of the mail server. In this case the admin has to manually create all the users and then change the passwords for all the users. Tedious job. Let’s make our life easier.

Setting the SUID/SGID bits: Giving a program YOUR permissions when it runs

Setting the SUID/SGID bits: Giving a program YOUR permissions when it runs

Normally, when a program runs under Linux, it inherits the permissions of the user who is running it, thus if I run a program under my account, the program runs with the same permissions that I would have if that program were me. Thus, if I cannot open a certain file, the program I am running also cannot open the file in question. If I set the SUID or SGID bit for a file, this causes any persons or processes that run the file to have access to system resources as though they are the owner of the file.

Using TAR with Bunzip2 files

Using TAR with Bunzip2 files

Bunzipping and then unTARring in two steps is not convenient.

It is not necessary to use Bunzip2 and then TAR to unzip a file in two separate steps.

Tar will do the job on its own if the -j switch is used, thus:

tar xjvf linux-source<version>.tar.bz2

By the same token, you may use the -z switch with a gzipped file, e.g.

tar zxvf linux-source<version>.tar.gz

first page
previous page
2
next page
last page
XML feed
"Facebook" is a registered trademark of Facebook, Inc. All rights reserved.