Showing headlines posted by linuxer

« Previous ( 1 ... 24 25 26 27 28 29 30 31 32 ... 33 ) Next »

An introduction to terminal multiplexers

If you're new to server administration and command-line, perhaps you haven't heard of terminal multiplexers or what they do. You want to learn how to be a good Linux sysadmin and how to use the tools of the trade. Or perhaps you're a seasoned administrator already and administer quite a few machines, and want to make your life a little easier. Or maybe you're somewhere in between.

Legacy Bios, UEFI and SecureBoot ready Ubuntu Live image customization

This article will provide you with a core information on how to create boot-able Ubuntu Live customized isohybrid image to get you started with your own Ubuntu distro spin-off. The output image will be amd64 customized Ubuntu live image, capable to boot in all three boot modes: Legacy Bios, UEFI and SecureBoot.

Kimai - Time Trakcer installation deployment using Docker

  • linuxconfig.org; By linuxconfig.org (Posted by linuxer on Jan 22, 2016 11:34 AM EDT)
  • Story Type: Tutorial; Groups: Debian, Linux
Kimai is a free open source timetracker. It tracks the time you spend with various pre-set projects and prints out a summary of your activities on demand. The automated docker Kimai time tracker image “linuxconfig/kimai” can be used to instantly deploy the Kimai time tracker on your docker hosts.

Configuring Ubuntu style sudo privilege authorization on Debian

The following lines will describe a procedure on how to mimic Ubuntu's sudo privilege authorization system on Debian Linux. Sudo allows users to run programs with the authorization privileges of another user by supplying their own password for authentication.

How to force fsck to check filesystem after system reboot on Linux

  • Linuxconfig.org (Posted by linuxer on Jan 11, 2016 5:56 PM EDT)
  • Story Type: Tutorial; Groups: Linux
This article will explain a procedure on how to force fsck to perform a filesystem check on the next system reboot or force filesystem check for any desired number of system reboots whether it is root or non-root mount point.

How to establish PPTP VPN client connection on CENTOS/RHEL 7 Linux

This guide will discuss a procedure on how to connect/establish a VPN connection using PPTP protocol on CentOS 7 or Redhat 7 Linux.

How to remove unused kernel images from CentOS Linux system

Every time you update your CentOS Linux and the update includes a new kernel image update the system will not remove your old kernel but it will cumulatively add new kernel to the top of your Linux kernel installed list. Normally, this does not present any issue to your running system and you are not required to take any action to remove any old and unused kernel images.

How to install RegRipper registry data extraction tool on Linux

RegRipper is an open source forensic software used as a Windows Registry data extraction command line or GUI tool. It is written in Perl and this article will describe RegRipper command line tool installation on the Linux systems such as Debian, Ubuntu, Fedora, Centos or Redhat. For the most part, the installation process of command line tool RegRipper is OS agnostic except the part where we deal with installation pre-requisites.

How to use a command line random password generator PWGEN on Linux

This article will provide you with some hints on how to generate random password using shell. Among many other tools which can be used on the Linux command line to generate random passwords such as openssl, mktemp, od or /dev/urandom the specific and easiest tool designed for this purpose is pwgen.

Bitcoin mining node deployment made easy with docker

  • Linuxconfig.org; By Linuxconfig.org (Posted by linuxer on Oct 15, 2015 10:51 AM EDT)
  • Story Type: Tutorial; Groups: Debian, Linux
If you feel extremely lucky or your have a supercomputer to your disposal you my try to mine for bitcoins to earn some extra cash. The complexity of Bitcoin's block chain hashing algorithm gets stronger every 2 weeks to combat the Moore's law so be sure to bring in some decent hardware. In this article we will show how to easily deploy a Bitcoin mining node with docker.

Redirect or block traffic based on country geographical location using Apache mod_geoip

  • Linuxconfig.org; By Linuxconfig.org (Posted by linuxer on Jun 23, 2015 12:07 PM EDT)
  • Story Type: Tutorial; Groups: Apache, Linux
In this config you will learn how to block or redirect web traffic based on the visitor's country geographical location using Apache's geoip mod.

Docker container: Backup and Recovery

  • Linuxconfig.org (Posted by linuxer on Jun 16, 2015 8:07 PM EDT)
  • Story Type: Tutorial; Groups: Linux
This config will describe a procedure of how to back up a Docker container as well as it will also show how to recover a Docker container from backup.

Getting started guide to server management using Puppet

In our scenario we are not going to run hundreds of operating systems and attempt to manage them. Our goal will be much simpler than that. In fact we are going to run only two separate systems running puppet master and puppet agent. Thus through the master puppet server we will attempt to configure a remote node and install "hello" package using puppet agent. This will be done with a bare minimum configuration possible.

How to determine whether a host system is virtual or physical machine

  • Linuxconfig.org (Posted by linuxer on May 29, 2015 4:51 PM EDT)
  • Story Type: Tutorial; Groups: Linux
The easiest way on how to determine whether a local or remote host is a virtual machine or bare metal physical server is to use Puppet Lab's tool facter.

How to use screen command to avoid unexpected ssh session termination

  • Linuxconfig.org; By Linuxconfig.org (Posted by linuxer on May 14, 2015 8:23 AM EDT)
  • Story Type: Tutorial; Groups: Linux
Your terminal session may get closed due to various network issues while you are running a process on a remote machine. As the result of this network disconnection your ssh shell session will also inadvertently kill any child processes run under your ssh session on the remote machine.

How to install and setup Debian 8 minimalist Docker Host

  • linuxconfig.org; By linuxconfig.org (Posted by linuxer on May 13, 2015 10:00 AM EDT)
  • Story Type: Tutorial; Groups: Debian, Linux
Task is to configure x86 bare metal machine as a docker host using Debian 8. You will need a network connection to the host to follow this guide. Also a connected keyboard and monitor.

LEMP ( Linux, Nginx, MariaDB, PHP ) stack Docker image deployment

The automated build docker LEMP image “linuxconfig/lemp” can be used as a testing and also as a production environment for a dynamic PHP applications. It comprises of Debian GNU/Linux, lightweight and yet powerful Nginx webserver, MariaDB a community-developed fork of the MySQL relational database management system and PHP scripting language.

How to upgrade Debian Linux system from Wheezy to Jessie stable release

This article describes an upgrade procedure from Debian Wheezy to Debian Jessie. Debian Linux with a code name "Jessie" is the latest stable Debian release which succeeds previous stable version "Wheezy".

Setting up the python virtualenv development environment on Debian Linux

In this config we will setup a python virtualenv. The intention behind the use of virtualenv as a python development environment is to separate global system installed executables and libraries with packages installed directly inside virtualenv. As a result, one is able to test a given python application with multiple system environments on a single host.

Configure anonymous Internet browsing on Fedora Linux with tor and privoxy

The intention of this config is to provide simple to follow steps on how to configure anonymous Internet browsing on Fedora Linux using privoxy and tor. Both services tor and privoxy are standalone services where tor provides anonymity using onion routing techniques and privoxy is a proxy server with content filtering and advertisement blocking.

« Previous ( 1 ... 24 25 26 27 28 29 30 31 32 ... 33 ) Next »