You might be using famous putty tool for connecting to your server via ssh or telnet. However there is one more way , with which you can connect via Browser. Yes you heard it right you can connect server using Chrome web browser. No need of putty tool always. By using chrome extension Secure Shell you can connect server using Chrome web browser.
How do you experience when something goes wrong on your system. You look at the system logs, of course! In all seriousness, understanding system logging is important so that you can troubleshoot when something went wrong. In Linux system we have syslog which captures every activity occurring on the system. Generally they are stored on the local system at location “/var/log/messages” but we can configure centralized syslog server where we can dump all the logs centrally to monitor all the logs in one go.
We can able restrict Disk space once we enable disk quota which alerts a sysadmin before a user takes too much disk space or a partition becomes full.Quotas can only be created for partitions.Quota is of two types, user and group.
Security-Enhanced Linux (SELinux) is a Linux feature that provides the mechanism for supporting access control security policies.But SELinux can sometimes get in your way. In that case you need to turn off-disable SELINUX. However before you turn off-disable SELINUX make sure you have a valid reason ,why you are doing it.
With RHEL 7 RedHat has made significant changes the way Linux used to work. Here we are discussing New features in RHEL 7.
Kali Linux is derived from Debian Linux flavor and its mainly used for penetration tasting. It has more than 300 pre-installed penetration-testing programs. It is a supported platform of the Metasploit Project’s Metasploit Framework, a tool for developing and executing security exploits. Let begin with hack windows with Kali Linux.Kindly note that , I am writing this post for education purpose only.
With AWS you can build free server on aws that to within a minute.amazon AWS offers free tier with a server “micro-instance” at no cost for one year.
Normally Linux servers are very much secured and illegal or unauthorised access is almost not possible with security policies in linux. However if linux can be installed on the laptop which makes it unsecured and worst situation occurs when you forget the laptop in public places such as trains, airports or bus where any proficient […]