How to manage remote MySQL databases on Linux VPS using a GUI tool

If you need to run a MySQL server on a remote VPS instance, how will you manage databases hosted by the server remotely? Perhaps web-based database administration tools such as phpMyAdmin or Adminer will first come to mind. These web-based management tools require a backend web server and PHP engine up and running. However, if […]
Continue reading…

 

How to set up remote desktop on Linux VPS using x2go

As everything is moved to the cloud, virtualized remote desktop becomes increasingly popular in the industry as a way to enhance employee’s productivity. Especially for those who need to roam constantly across multiple locations and devices, remote desktop allows them to stay connected seamlessly while preserving their work environment. Remote desktop is attractive for employers […]
Continue reading…

 

How to secure SSH login with one-time passwords on Linux

As someone says, security is a not a product, but a process. While SSH protocol itself is cryptographically secure by design, someone can wreak havoc on your SSH service if it is not administered properly, be it weak passwords, compromised keys or outdated SSH client. As far as SSH authentication is concerned, public key authentication […]
Continue reading…

 

How to set up server monitoring system with Monit

Many Linux admins rely on a centralized remote monitoring system (e.g., Nagios or Cacti) to check the health of their network infrastructure. While centralized monitoring makes an admin’s life easy when dealing with many hosts and devices, a dedicated monitoring box obviously becomes a single point of failure; if the monitoring box goes down or […]
Continue reading…

 

How to set up a cross-platform backup server on Linux with BackupPC

Just in case you haven’t been able to tell from my earlier posts on backupninja and backup-manager, I am a big backup fan. When it comes to backup, I’d rather have too much than not enough, because if the need arises, you will be grateful that you took the time and effort to generate extra […]
Continue reading…

 

How to set up two-factor authentication for SSH login on Linux

With many high-profile password leaks nowadays, there is a lot of buzz in the industry on “multi-factor” authentication. In a multi-factor authentication system, users are required to go through two distinct authentication procedures: providing something they know (e.g., username/password), and leveraging something they have “physical” access to (e.g., one-time passcode generated by their mobile phone). […]
Continue reading…

 

How to remote control Raspberry Pi

Once you have a fully working Raspberry Pi system, it may not be convenient for you to continue to access Raspberry Pi directly via a keyboard and HDMI/TV cable connector dedicated to Raspberry Pi. Instead, you will want to remote control “headless” Raspberry Pi from another computer. In this tutorial, I will show you how […]
Continue reading…

 

How to access ssh terminal in web browser on Linux

Running “everything” in a web browser used to be a bold statement. Due to the powerful HTML5/JavaScript stack, however, a web browser increasingly becomes a dominant application delivery platform. Even the Linux kernel sandboxed in a web browser no longer sounds so crazy these days. In this tutorial, I describe how to access an SSH […]
Continue reading…

 

How to synchronize files between two servers bidirectionally

Suppose you have a collection of files which are replicated on two different servers. The two replicas are then modified independently, and you want whatever changes made in one replica to be propagated to the other, so that both replicas remain in sync. There are several file mirroring tools on Linux, such as rsync or […]
Continue reading…

 

How to create a secure incremental offsite backup in Linux with Duplicity

If you maintain mission-critical data on your server, you probably want to back them up on a remote site for disaster recovery. For any type of offsite backup, you need to consider encryption in order to avoid any unauthorized access to the backup. In addition, it is important to use incremental backup, as opposed to […]
Continue reading…