Articles by Ali Imran Nagori
-
OpenSSH Security Hardening Guide for Linux
Author: Ali Imran Nagori • Tags: linux, security • Comments: 0SSH is one of the most widely used protocols for system administration on Linux platforms. This guide shows how to harden the SSHd setup of your server.
-
How to configure Host-Based routing on AWS application load balancer
Author: Ali Imran Nagori • Tags: cloud, linux, networking • Comments: 0In AWS, ELB or Elastic Load Balancing is a concept where the servers can be added or released as per the demand of our application. The incoming traffic from an application is distributed among multiple targets.
-
How to Configure Path-Based routing in an AWS Application Load Balancer
Author: Ali Imran Nagori • Tags: cloud, linux • Comments: 1In AWS, ELB and Elastic Load Balancing exists a concept where the servers can be added or released as per the demand of our application and the incoming traffic from an application is distributed among multiple targets. In this tutorial, we will configure path-based routing for an Application Load Balancer on AWS. We are going to use an IAM user account for this task.
-
-
4 CLI based Linux Performance Monitoring Tools: top, htop, ps and vmstat
Author: Ali Imran Nagori • Tags: linux • Comments: 1In this guide, we will present some of the commonly used command-line-based tools for monitoring system performance. We are using Ubuntu 20.04 OS for this guide, although the tools we are going to discuss are available for most Linux-based distros.
-
Exploring the Lynis Audit Report
Author: Ali Imran Nagori • Tags: linux, security • Comments: 0Lynis is a free and open-source security auditing tool and released as a GPL licensed project and is available for Linux and Unix-based Operating systems. In this tutorial, we will try to explore the Lynis audit report and learn to apply some of the reforms it suggests. Let's now get started with this guide.
-
Linux Security Auditing with Lynis
Author: Ali Imran Nagori • Tags: linux • Comments: 0Lynis is a free and open-source security checker released under the GPL license and available for Linux and Unix-based operating systems such as MacOS, FreeBSD, NetBSD, OpenBSD, etc. In this article, we will explore how to install Lynis and conduct an audit of a Kali Linux system.
-
How to Audit a Remote Linux system with Lynis Security Tool
Author: Ali Imran Nagori • Tags: linux, security • Comments: 0Lynis is a free and open-source security auditing tool released as a GPL licensed project and is available for Linux and Unix-based Operating systems. In this tutorial, we will provide instructions on how to perform a Lynis security audit on a remote system.
-
Introducing the Wireshark command Line Interface: The TShark
Author: Ali Imran Nagori • Tags: linux, security • Comments: 0TShark is designed as a CLI or command-line interface of Wireshark for capturing and analyzing packets right from the CLI. In this tutorial, we will explain to you about TShark and present you with some basic use cases. Let’s dive in with TShark.
-
Capturing Packets with Tcpdump and analyzing them with Wireshark on Ubuntu
Author: Ali Imran Nagori • Tags: linux, security, ubuntu • Comments: 0In this guide, I will show you how to analyze network Packets on Linux. I will use the Tools Tcpdump and Wireshark. This tutorial uses Ubuntu as OS, but it is applicable to other Linux distributions too.
-
How to use Filters in Wireshark
Author: Ali Imran Nagori • Tags: monitoring, networking, security • Comments: 0Wireshark (Formerly Ethereal) is used for capturing and investigating the traffic on a network. In this guide, we are going to explore how to create and efficiently apply filters in Wireshark. Let us get started now.