Amcrest Cameras in Linux using VLC and RTSP
I have been using Amcrest cameras and a NV4116E NVR for some time now. Since my main office workstation is Linux I never had a convenient way to view my cameras. During this short article we will explain how to setup VLC to view your...
Introduction to UFW - Uncomplicated Firewall Basics
Learn the basics of UFW (Uncomplicated Firewall), the default firewall configuration tool for Ubuntu. Learn how to add and delete rules and much more!
Use DoD Smart Card PKI Authentication with FireFox on Linux
Here is a basic tutorial on how to get your Government or DoD Smart Card (Common Access Card or CAC) working with Firefox in Linux. This will allow you to access Government and DoD website which require PKI authentication using your common access card. This...
How To Stop Your SSH Session From Disconnecting
Q: When I connect to one of my Linux servers via SSH, after about 10 minutes of inactivity my connection is closed. How do I stop this from happening. A: You can configure your SSH client to send a small packet called no-op (no operation). The no-op...
cp Command - Copy Files on the Linux Command Line
Learn the Linux cp (copy) command and some of it's options including recursive copy, verbose copy, preserving permissions & security context, and wildcards.
How To Send Mail Through ISP SMTP With Postfix
Q: I am trying to configure postfix to send email through my ISP SMTP service or my shared hosting services external SMTP. I found a lot of tutorials via google, but none seems to work for me. A: First, you should check with your ISP and make...
Explaination of ssh:notty, root@notty, or username@notty.
Question sent in by Charles F. from Virginia. Q: I recently logged into one of my Linux machines as root and have seen the following message: Last failed login: Fri Aug 20 04:13:45 EDT 2014 from *.*.*.* on ssh:notty Have I been hacked? Was is notty?...
Find BIOS information for several Linux servers
Use the dmidecode command to find BIOS information about your Linux system.
Password Protect Single User Mode in Red Hat or CentOS
Allowing access to single user mode in Linux is a major security risk. Setting it to require the root password before booting into single user mode is a good idea. Here we will explain two methods to password protect single user mode. How to require...
Creating IPsec Tunnel Between Two Hosts using openswan
Learn how to create an end to end IPsec tunnel between two hosts using openswan.