November 2024
M T W T F S S
 123
45678910
11121314151617
18192021222324
252627282930  

Categories

November 2024
M T W T F S S
 123
45678910
11121314151617
18192021222324
252627282930  

Monitoring Bandwidth – Linux

Here is the list of bandwidth monitoring tools for network bandwidth

bmon bwbar bwm bwm-ng iftop iperf ipfm speedometer cbm ibmonitor pktstat mactrack MRTG Cacti

I think most of the above tools should also be available for other distribution of Linux.

. Here is a link using which bwm-ng can be installed and run on […]

Managing your Linux/Unix log files using logrotate

Log files are one of the most important files where almost all precious and sometimes unnecessary information are stored in regard to your server’s running state. For example, if your system’s security has been breached or compromised, it’s these log files which will come to your rescue to help you identity where or what went […]

Additional Swap File in Linux

What is swap? Swap space is the area on a hard disk which is part of the Virtual Memory of your machine, which is a combination of accessible physical memory (RAM) and the swap space. Swap space temporarily holds memory pages that are inactive. Swap space is used when your system decides that it needs […]

LINIX -Bonding

LINIX -Bonding Bonding – Linux allows binding multiple network interfaces into a single channel/NIC using special kernel module called bonding.The Linux bonding driver provides a method for aggregating multiple network interfaces into a single logical “bonded” interface. The behavior of the bonded interfaces depends upon the mode; generally speaking, modes provide either hot standby or […]

Security Configuration Benchmark For Red Hat Enterprise Linux 5

CIS Red Hat Enterprise Linux 5 Benchmark Introduction Red Hat Enterprise Linux version 5 (RHEL5) is the new server-class release from Red Hat, Inc, that stabilizes SELinux, has been Common Criteria evaluated at EAL4+ and brings further stability and robustness to the enterprise level with this OS. Security hardening remains a vital element to the […]

VPN Server With OpenVPN

Depending on your circumstances you may want to run the VPN from your home, or you may want to rent a VPS to run it from. If you’re just trying to get into your home network, an SSH tunnel might be easier; I will write something about SSH tunneling later. For the purposes of this […]

Central Syslog Server

It’s so easy if you want to have logs centrally. So you need to decide which server will be syslog server, and then do this:

1. On the server edit: /etc/sysconfig/syslog

Make the settings like:

SYSLOGD_OPTIONS=”-m 0 -r”

2. On the client edit: /etc/syslog.conf

Add this line:

*.* @syslog_server_ip_address

Thats all, your clients will send […]

Recovery of deleted /etc/passwd File in Linux

Recovery of deleted /etc/passwd File in Linux In that case you need to recover /etc/passwd file first. For this you have to following steps, -Start GRUB on boot (press ESC while booting) -Press e over (recovery mode) -Press e over the line beginning with kernel -Press Space bar and enter “init=/bin/bash” -Press enter -Press b […]

Stop or Pause Process in Linux Server

Stop or Pause Process in Linux Server

ome times we may need to pause a particular process or service in Linux Servers.

We may need to stop a particular process without killing it for certain period of time and resume it again.

This can be done with KILL Command.

Most of us familiar with KILL […]