SSH (Secure Shell) is a protocol for creating a secure connection between two computers. The secure SSH connection provides authentication and encryption. On the server, it is possible to configure a SSH logon banner (or welcome banner) with the use…
HOW TO PROTECT YOUR SERVER FROM DDOS ATTACK
Before to start, I would describe what is DDOS attack On the Internet, a distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted…
HOW TO ADD SOFTWARE REPOSITORY IN UBUNTU OR DEBIAN
Software repository does not add when we install Debian Linux from CD/DVD without Internet connection. You can’t update the Debian Linux is without software repository, but you can add it later. Find a repository near your area. Download from remote…
Performance Tuning – Open LDAP
Built OpenLDAP server live and running. You need to tune the performance of your OpenLDAP server. Every installation might be handling different kind of load and must be facing different kind of performance issues. Here I will try to explain…
GRUB 2 Recovery In Linux
We often come across a condition in which the boot loader gets corrupt. Here are a few steps that will help you recover your GRUB 2 boot loader. Boot from a live CD or DVD, which supports GRUB 2 ([highlight1]Ubuntu…
Traceroute vs Ping vs Mtr
Dear Blog Reader, Someone asked which tools is a better tool to use. I think its better to start with the roots. We should first understand the internal working to these 3 network utilities u asked in question. So lets…