How to install Suricata intrusion detection system on Linux

With incessant security threats, intrusion detection system (IDS) has become one of the most critical requirements in today’s data center environments. However, as more and more servers upgrade their NICs to 10GB/40GB Ethernet, it is increasingly difficult to implement compute-intensive intrusion detection on commodity hardware at line rates. One approach to scaling IDS performance is […]
Continue reading…

 

How to switch from NetworkManager to systemd-networkd on Linux

In the world of Linux, adoption of systemd has been a subject of heated controversy, and the debate between its proponents and critics is still going on. As of today, most major Linux distributions have adopted systemd as a default init system. Billed as a “never finished, never complete, but tracking progress of technology” by […]
Continue reading…

 

How to set up a system status page of your infrastructure

If you are a system administrator who is responsible for critical IT infrastructure or services of your organization, you will understand the importance of effective communication in your day-to-day tasks. Suppose your production storage server is on fire. You want your entire team on the same page in order to resolve the issue as fast […]
Continue reading…

 

How to configure virtual hosts in Apache HTTP server

Virtual hosting refers to the technique that allows a physical server to host more than one website domain (e.g., site1.com, site2.com). Virtual hosting is prevalent in shared web hosting environments, where typically hundreds or more of websites or blogs are packed on a single dedicated server to amortize server maintenance cost. You are not a […]
Continue reading…

 

How to monitor stock quotes from the command line on Linux

If you are one of those stock investors or traders, monitoring the stock market will be one of your daily routines. Most likely you will be using an online trading platform which comes with some fancy real-time charts and all sort of advanced stock analysis and tracking tools. While such sophisticated market research tools are […]
Continue reading…

 

How to download apk files from Google Play Store on Linux

Suppose you want to install an Android app on your Android device. However, for whatever reason, you cannot access Google Play Store on the Android device. What can you do then? One way to install the app without Google Play Store access is to download its APK file using some other means, and then install […]
Continue reading…

 

How to access SQLite database in Perl

SQLite is a zero-configuration, server-less, file-based transactional database system. Due to its lightweight, self-contained, and compact design, SQLite is an extremely popular choice when you want to integrate a database into your application. In this post, I am going to show you how to create and access an SQLite database in Perl script. The Perl […]
Continue reading…

 

Raspberry Pi vs. Raspberry Pi 2 vs. CuBox: performance comparison

Ever since Raspberry Pi was introduced to the world, the consumer market for inexpensive, pocket-size mini computers has been growing rapidly. The huge popularity of these tiny computers in the mainstream stems from a variety of DIY projects powered by these affordable hardware, as well as many readily available open-source software packages. While the first […]
Continue reading…

 

How to access a Linux server behind NAT via reverse SSH tunnel

You are running a Linux server at home, which is behind a NAT router or restrictive firewall. Now you want to SSH to the home server while you are away from home. How would you set that up? SSH port forwarding will certainly be an option. However, port forwarding can become tricky if you are […]
Continue reading…

 

What are good open-source log monitoring tools on Linux

In an operating system, logs are all about keeping track of events, be it critical system errors, resource usage warnings, transaction history, application status, or user activities. These logs, which are stored as (text or binary) files in the system, are useful for system auditing, debugging and maintenance. However, with so many different system entities […]
Continue reading…