Configuring postfix relay for mail sending Ubuntu 16.04

Postfix can be used to send mails to an external SMTP relay which is helpful if you want to setup notification sending from your server. The following steps will outline email sending using the Linux command line directly which can also be used for monitoring scripts that can send email notifications. Continue reading “Configuring postfix relay for mail sending Ubuntu 16.04”

Raspberry Pi Thin Client

This tutorial creates a Raspberry Pi, a low cost single board computer, which can be used as a thin client that works with RDP, VMWare View, Citrix, OpenNX, and Spice. The base image for the OS is based on Debian.

Continue reading “Raspberry Pi Thin Client”

The Linux Filesystem Explained

Have you ever wondered what all the folders on the root (/) directory of the Linux filesystem are for? Which file goes into which directories and why are they saved in those directories? On this post, we’ll check out each folder and what purpose or function they serve for the operating system itself. Continue reading “The Linux Filesystem Explained”

Comparing files using the diff command

The diff command outputs the differences between two files, line by line. For files that are identical it produces no output, for binary files only reports if they are different or not.

The set of differences produced by diff is often called a diff or patch, and this output can be used later on by the patch command to change other files. Continue reading “Comparing files using the diff command”

How To Tell If Your Linux Server Has Been Compromised

A server being compromised or hacked for the purpose of this guide is an unauthorized person or bot logging into the server in order to use it for their own, usually negative ends. However, the majority of compromised servers are carried out by bots i.e. automated attack programs, in-experienced attackers e.g. “script kiddies”, or dumb criminals. These sorts of attackers will abuse the server for all it’s worth whilst they have access to it and take few precautions to hide what they are doing.

Continue reading “How To Tell If Your Linux Server Has Been Compromised”

How to effectively use the GREP command

Grep is a very important & powerful Linux commands. It stands for ‘Global Regular Expression Print’ & is used for matching & printing a search pattern or a regular expression from a single or multiple text files. It will look for the pattern if the mentioned files & will than print the result on screen or to an output file.
In this tutorial, we are going to learn to use grep command with examples. Continue reading “How to effectively use the GREP command”

17 Things about Security

A list for protecting yourself and others from the most common and easiest-to-pull-off security crimes.

This article does not attempt to make you an information security guru or provide everything needed for those who are special targets. This is a list you can use to secure yourself, your significant other and your non-techie loved ones from the majority of the most-common and easiest-to-pull-off types of crime and cruelty. Continue reading “17 Things about Security”

How to find out PID in Linux

Every Linux process has a process ID (PID) assigned to it.  It is a unique identification number that is automatically assigned to each process when it is created in an operating system. A process is a running instance of a program. In this tutorial we’ll look into ways on how to find the PID of process.

Continue reading “How to find out PID in Linux”