Category: Blogs

penguin banner3 520x245 - Powerful chattr command in Linux 0

Powerful chattr command in Linux

chattr (change attributes), is a powerful command line utility which is used to change the file attributes on a Linux file system. There is a number of benefits which can be obtained fruitfully by adding these advanced attributes to certain file/directories in a Linux file system. Accidentally, Users and Administrators may overwrite, modify or remove some important files on the Linux file system and put themselves in big trouble. Using...

Surveillance Linux Machine 5

How can I check who is logged on my Linux system?

Linux is an extraordinary operating system, which lets the user record every single process running on it. Today, we are going to show some thrilling commands, using which you can track “who is logged on my Linux system”. This tutorial will be very useful for administrators and novice users to Linux. 1. Using command “w” w displays information about the users currently on the machine, and their processes. ubuntu@ip-172-31-12-106:~$ w...

hsts 520x245 - How to Setup HTTP Strict Transport Security (HSTS) for Apache 0

How to Setup HTTP Strict Transport Security (HSTS) for Apache

HTTP Strict Transport Security, widely known as HSTS, is a web security policy mechanism in which website tells the browser that it should only be communicated using HTTPS, instead of using HTTP Protocol. This is achieved using an HSTS response header sent at the very beginning to the browser. The question which arises here is, why we want our website to communicate only over HTTPS Protocol??? HTTP stands for HyperText...

Two Factor Authentication 2

How to setup 2-Factor Authentication for GUI & SSH login | Google Authenticator

“Thought of security is a symptom of hidden insecurity in your mind”. We live in a world where data is one of the most important assets and risk of data loss always keep on swinging on our head like a pendulum. Therefore, We should seek and make every possible attempt to secure and authenticate our data. To avoid this threat administrators prefer to keep hard and complex passwords for login...

MongoDB Administration 1

MongoDB Administration

Introduction Nowadays, Usage of MongoDB has grown up rapidly, but the main question is ??? How efficiently are you running MongoDB on your environment ??? Planning your environment and setting things up for success is great. In most of the cases, Administration and Monitoring of Mongo is “Taken with a grain of salt”. Monitoring Tools & Technique Log File – mongod.log The basic tool for monitoring activities in mongo is...

apache log client ip 520x245 - Configure Apache server to log client’s public IP addresses behind a Load Balancer 0

Configure Apache server to log client’s public IP addresses behind a Load Balancer

OBJECTIVE Today, We are configuring Apache to log the client’s source IP Address behind a load balancer, to track the authenticity of hits requested on your web server. This data collection will add a lot of advantage to your work. You can track and block IP addresses attempting DOS or DDOS attack to your website, using Web Application Firewall. Get the insights for Geolocation Setup and launch servers in multiple...