Using rsync to Synchronize Directories Over SSH
Q: How can I synchronize a local directory with a remote directory on another linux machine. I have a Fedora system and would like to have it automatically synchronize a specific directory with a remote directory to create an online backup. A: With Linux there...
How to setup SSH Key Authentication - SSH Passwordless Login
Learn how to generate and publish SSH key pairs to log into remote systems.
Using perl and expect to automate SSH connections.
Using perl to automate ssh login using Net::SSH::Expect module. This tutorial assumes you are using Red Hat or a Red Hat based distro (Centos, Fedora). The script itself will work on any operating system, but installing perl and modules steps may differ from OS to...
How to Add Comments to UFW Rules
How to add a comment to UFW (uncomplicated Firewall) rules. UFW is the default firewall for Ubuntu and many other Linux distributions.
CrowdSec - Open Source Security Automation Tool
CrowdSec is a massively multiplayer firewall designed to protect Linux servers, services, containers, or virtual machines exposed on the internet with a server-side agent. It was inspired by Fail2Ban and aims to be a modernized, collaborative version of that intrusion-prevention tool. CrowdSec is free and...
SFTP, FTPS, and SCP - What's the Difference?
What is the difference between SCP, SFTP, and FTPS? In this article we try to highlight the differences, strengths and limitations of each protocol.
Create iptables Rules Based on Hostname Using an IPSet
Learn how to use IP Sets and a simple Bash script to update your iptables rules based on a clients hostname or domain name instead of IP address.
Linux Who Command - Display List of Logged In Users
The Linux who command displays list of users that are logged into a system from the terminal or remotely along with other system information.
systemd-tmpfiles - Managing Temporary Files & Directories
Using systemd-tmpfiles services for managing system and user temporary files and directories and creating user specific systemd-tmpfiles configurations.
Brute Force Attacks - Pen Testing Using Hydra and RSMangler
How to use Hyrdra and RSMangler to launch a brute force attack. Penetration testing professionals use these tools for cybersecurity evaluation of a system.