What are useful command-line network monitors on Linux

Network monitoring is a critical IT function for businesses of all sizes. The goal of network monitoring can vary. For example, the monitoring activity can be part of long-term network provisioning, security protection, performance troubleshooting, network usage accounting, and so on. Depending on its goal, network monitoring is done in many different ways, such as […]
Continue reading…

 

How to deduplicate files on Linux with dupeGuru

Recently, I was given the task to clean up my father’s files and folders. What made it difficult was the abnormal amount of duplicate files with incorrect names. By keeping a backup on an external drive, simultaneously editing multiple versions of the same file, or even changing the directory structure, the same file can get […]
Continue reading…

 

How to set up a cross-platform backup server on Linux with BackupPC

Just in case you haven’t been able to tell from my earlier posts on backupninja and backup-manager, I am a big backup fan. When it comes to backup, I’d rather have too much than not enough, because if the need arises, you will be grateful that you took the time and effort to generate extra […]
Continue reading…

 

How to configure fail2ban to protect Apache HTTP server

An Apache HTTP server in production environments can be under attack in various different ways. Attackers may attempt to gain access to unauthorized or forbidden directories by using brute-force attacks or executing evil scripts. Some malicious bots may scan your websites for any security vulnerability, or collect email addresses or web forms to send spams […]
Continue reading…

 

How to block unwanted IP addresses on Linux efficiently

You may want to block IP addresses on your Linux box under various circumstances. For example, as an end user you may want to protect yourself from known spyware or tracker IP addresses. Or when you are running P2P software, you may want to filter out connections from networks associated with anti-P2P activity. If you […]
Continue reading…

 

How to configure rsyslog client for remote logging on CentOS

rsyslog is an open source utility widely used on Linux systems to forward or receive log messages via TCP/UDP protocols. rsyslog daemon can be configured in two scenarios. Configured as a log collector server, rsyslog daemon can gather log data from all other hosts in the network, which are configured to send their internal logs […]
Continue reading…

 

How to create a custom backup plan for Debian with backupninja

Backupninja is a powerful and highly-configurable backup tool for Debian based distributions. In the previous tutorial, we explored how to install backupninja and how to set up two backup actions for the program to perform. However, we should note that those examples were only “the tip of the iceberg,” so to speak. In this post […]
Continue reading…

 

How to configure a syslog server with rsyslog on Linux

A syslog server represents a central log monitoring point on a network, to which all kinds of devices including Linux or Windows servers, routers, switches or any other hosts can send their logs over network. By setting up a syslog server, you can filter and consolidate logs from different hosts and devices into a single […]
Continue reading…

 

What is a good free control panel for VPS

Anyone with a reasonable level of Linux skills knows that no control panel can beat the plain-old command line interface for managing a virtual private server (VPS). One can still argue that there is a place for a good server control panel though, due to the streamlined interface for getting routine administration tasks done easily […]
Continue reading…

 

How to back up a Debian system using backupninja

Prudence or experience by disaster can teach every sysadmin the importance of taking frequent system backups. You can do so by writing good old shell scripts, or using one (or more) of the many backup tools available for the job. Thus the more tools you become acquainted with, the better informed decisions you will make […]
Continue reading…