Setting up public key authentication over SSH
Generate key on local machine
ssh-keygen -t rsa
It will ask you for a password but you can leave it blank.
Note you could also pick -t dsa if you prefer.
Ensure that the remote server has a .ssh directory
Continue reading Setting up public key authentication over SSH
Adding Swap File under Linux
If you are adding more memory on your dedicated server, you will need to add more swap space. You have two choices: add or upgrade a swap partition or create a swap file. Because changing the size or create a new swap partition is not easy, the best solution is to create a new swap file. Since the 2.6 Linux kernel, the swap files are just as fast as swap partitions.
Continue reading Adding Swap File under Linux
Shell Scripts
Introduction
If a group of commands or command list are used frequently, such list of commands can be stored in a file so that they are analyzed and executed by a shell as a single entity.
A file containing such command names is called a shell script. Shell scripts are text files and can be created with an editors like vi, emacs, pico etc. |
NMAP Scan
Speedy NMAP scans
Nmap (http://www.insecure.org/nmap) is the most popular network scanner widely used and misused. Most people tend to ignore the various “switches (options)” and only use the default parameters. It is possible to prioritize SPEED or STEALTH in nmap scans but i’ll mainly be talking about maximizing SPEED.
Continue reading NMAP Scan
GNU Project
Many computer users run a modified version of the GNU system every day, without realizing it. Through a peculiar turn of events, the version of GNU which is widely used today is more often known as “Linux”, and many users are not aware of the extent of its connection with the GNU Project.
Zope in Nepali Market
Zope is a relatively obscure but powerful open source application server based on Python programming language. Zope has been around for over half a decade but is relatively unknown in the market due to its perhaps eccentric nature as compared to market heavyweights such as J2EE and .NET.
E-Business
The term E-business was initially used by IBM in 1997. In order to allow more types of business on the web created the term E-Business. But we generally happen to have the term E-Commerce more frequently. Actually, E-commerce is only one aspect of E-Business. E-business is about using the convenience, availability and world-wide reach to enhance existing businesses or creating new virtual business. As defined by IBM, “E-Business is a secure, flexible
and integrated approach to deliver differentiated business value by combining the systems and processes that run core business operations with the simplicity and reach made possible by Internet technology. In other words, when the resources of traditional information systems are combined with the vast reach of the Web and connect critical business system directly to critical business constituencies – customers, employees and suppliers via Intranets, Extranets and the Internet.
Snort – Intrusion Detection System
Designed to fill the gap left by expensive, heavy-duty network intrusion detection systems, Snort is a free, cross-platform packet sniffer, logger, and intrusion detector for monitoring smaller TCP/IP networks. It runs on Linux/UNIX and Win32 systems. It takes mere minutes to install and start using it.
Continue reading Snort – Intrusion Detection System
Linux and NetBSD
The two operating systems are generally very similar, but they have some important differences:
Linux behaves more like System V UNIX, while NetBSD is more similar to the Berkeley flavors of UNIX. From an end user perspective, Linux tends to support more and newer hardware, and tends to have a larger share of users. NetBSD tends to support less new hardware, but its support for existing hardware is always very solid. Linux comes in several
distributions from different groups such as RedHat, Debian, Caldera, and Slackware, whereas NetBSD has only one distribution. Continue reading Linux and NetBSD