8 Best practices with sudo on Linux – Do’s and Dont’s of sudo All Linux users these days would be familiar with sudo command (stands for “superuser do”). We need to popularize sudo...
[Linux] :Top 12 security features to Enable in SSH server ! A couple of ways you can find to access a shell (command line) remotely on most Linux/Unix systems. One of...
[Linux]: How to Hash Known Hosts Files of ~/.ssh/ directory During connecting to a SSH server, the client stores the few details like Server’s Hostname, IP Address and Host key...
[Linux] : How to stop automated bot based SSH attacks ? I’ve seen many a times in my LogWatch report about “Refused incoming connections” from a number of IP’s. These are may be...
13 dig command examples to Dig through DNS records Dig, the Domain Information Groper is one of the useful utility to lookup Domain Name System (DNS). The command helps...
How to Test and Validate DNSSEC using dig and Web Tools? Have you enabled DNSSEC on DNS Server? If not, learn how to enable DNSSEC on Bind based DNS Server. Once...
Configuring DNSSEC on Bind 9.8.2 on CentOS, RHEL,Ubuntu and Debian This tutorial will help you to configure DNSSEC on Bind9 (version 9.8.2) on CentOS operating system. However, the procedure will...
An Ultimate Guide to Upgrade Kernel on CentOS/RHEL/Fedora Well, there are plenty of reasons why you should run latest version of Linux Kernel. For instance, the current kernel...
How to allow or deny remote login to specific user accounts on Linux server If an attacker gains root login to your system, he can do more damage than if he gains normal user...
How to disable or drop Ping (ICMP) packets to your server? [Linux Basics] One of our regular reader at Techglimpse, asked me this question. Question: How can i disable ping requests to my...
How to disable remote login for root user on Linux machine These days by default a user called root would be created on every Linux system. In distros like RHEL, fedora,...
10 Effective Mysqldump command Examples for your Reference MySQL is one of the most widely used Database system, that comes with tons of effective command line utilities. For...
Beginners guide to DNSSEC and how it can secure the Internet This article assumes that you have gone through What is DNS and how it works? Domain Name System (DNS) is...
[Linux]: 15 most frequently used YUM Commands with examples YUM stands for Yellowdog Updater Modified, is an open source command line package management for RPM-based distributions of Linux like RedHat, CentOS,...
[Linux] : How to install and use auto-completion or tab completion feature in YUM When at the Linux or Unix shell typing in long file names or directories can become a burden, and to...
11 things you probably wouldn’t have tried in PuTTY ? All windows users who connect to their Linux servers need not have an introduction about this great tool called PuTTY....
[Linux] : How to exclude directory when using “tar” shell command In day-to-day activities administrators needs to perform regular backups on their Linux servers. Being myself an administrator, i would recommended...
[Linux] : 7 things you will learn as you start writing a simple Shell script A system administrator will always think of automating most of his tasks so that the routine jobs are completed easily...
20 OpenSSL Commands Examples that you must know OpenSSL is an open source toolkit used to implement the Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols....
[Linux]: How to prevent accidental execution of “rm -rf” command As humans we should accept that mistakes like : rm -rf * would happen ! As saying “Prevention is better than...