Showing headlines posted by johnludhi

( 1 ... 2 ) Next »

Automate SSH Login Using Ssh Agent And Sshpass

  • usessionbuddy.com; By John Ludhi (Posted by johnludhi on Dec 19, 2021 9:02 PM EDT)
  • Story Type: Tutorial; Groups: Linux
Checkout how to automate the ssh login using ssh-add, ssh-agent and sshpass on Linux.

How To Setup MySQL Percona Database Servers On Kubernetes Infrastructure

Checkout step by step instructions on how to setup Mysql Percona database servers on Kubernetes infrastructure

How To Install KeePass And Use It To Manage Passwords

KeePass is a free and open-source password manager. Check out how to install and use KeePass on Ubuntu.

How To Install Docker And Pull Images From Docker Hub

Learn how to install Docker and pull images from Docker Hub

Getting Started With Python Package Managers

  • usessionbuddy.com; By John Ludhi (Posted by johnludhi on Oct 23, 2020 1:32 PM EDT)
  • Story Type: Tutorial; Groups: Python
In depth tutorial on how to setup Python virtual environment on Linux using Package managers

How To Copy A Block Of Text In Vim

This post shows you how to copy a continue block of text in Vim

Data Manipulation Using Python Pandas On Bash Command Line

Check out this post to learn about a Python utility Pandashells to run Pandas data manipulation commands on Bash command line.

How To Run Apks on Linux

Checkout this post on Android development on Linux using Anbox.

Sed Find And Replace With Examples

Checkout easy to understand sed examples to do find and replace string from input, find and replace in a file, append to a file, remove empty lines from file, find and replace between specific lines etc.

How to Install Docker on CentOS 8

Docker is an open-source tool that allows you to create, test and deploy applications inside containers. In this tutorial, we will show you how to install Docker CE on CentOS 8.

Awk Cheatsheet And Examples

Please checkout tutorial with examples on how to use Awk for text processing.

Unix Find Command Cheatsheet And Usage

  • usessionbuddy.com; By John Ludhi (Posted by johnludhi on May 13, 2020 10:55 AM EDT)
  • Story Type: Tutorial; Groups: Linux
Tutorial on how to use find command in Unix with examples.

How To Setup And Configure MySQL Percona Xtradb Cluster

In this tutorial, I have gone through how to install and configure a cluster of database servers running Percona XtraDB.

How To Capture Network Traffic With Tcpdump

Tcpdump is a free and open-source command-line utility that can be used to capture the incoming and outgoing network traffic from your system. In this tutorial, we will show you how to capture packets using Tcpdump on Linux with some examples.

Cracking Wireless Networks With Kali

This is sequel to my first post which is about Wireless Penetration Testing.Please check it out for more details.

Wireless Penetration Testing

The ability to connect devices without physical access to them, also makes it hard to control who has that access. In this tutorial, we will go through various methods of gaining access to protected wireless networks, which will give you the needed know-how that will help you to set up your wireless environment as secure as possible. Due to the open nature of Linux, there are loads of ready made Linux distributions out there, whose sole purpose is penetration testing, and among them there are a few specialized in wireless field.

How to Install Naxsi Firewall with Nginx on Ubuntu 18.04

Naxsi is an open-source web application firewall specially designed for Nginx. Checkout my post about how to install and configure Naxsi on Ubuntu.

How to Install OpenVAS Vulnerability Assessment System on Ubuntu 18.04

OpenVAS is an open-source Vulnerability Assessment System that can be used to run the test against servers for known vulnerabilities. Checkout the post on how to install and configure openVAS on Ubuntu.

How to Install And Configure Snort NIDS on CentOS 8

Tutorial on how to install and configure Network Intrusion Detection System Snort on Centos 8.

How to Protect Your Server with Fail2ban on CentOS 8

Fail2ban is a free, open-source and most widely used IPS (Intrusion Prevention System) application that can be used to protect your server against brute force password login attacks. In this post I have explained how to configure and install Fail2ban utility on Centos 8. Also Check out how you can protect your SSH and HTTP against different kinds of attacks using Fail2Ban.

( 1 ... 2 ) Next »