3 liens privés
If you want to monitor network throughput on the command line interface, use nload application. It is a console application which monitors network traffic and bandwidth usage in real time. It visualizes the in and outgoing traffic using two graphs and provides additional info like total amount of transferred data and min/max network usage.
Entropy is nothing but the measure of “randomness” in a sequence of bits. The PRNG ( pseudorandom number generator ) is a special device (e.g. /dev/random on Linux) to create randomness from server hardware activities
Domain Keys Identified Mail, or DKIM, is another security mechanism available to us that allows us to prevent spoofing or forging of emails from our domain. Using public key cryptography to assure the integrity and authenticity of emails, properly configured DKIM is an excellent protection.
Debian is preparing to revise its default file system mapping to bring it in in line with other major distributions (like Fedora and CentOS).
Je vais ici vous présenter une méthode pour surveiller les accès au fichier "/etc/passwd". Je note que je viens de découvrir l'outils qui a l'air de contenir des contextes d'utilisation vraiment étendues et intéressants et qui sert globalement à surveiller (auditer) les accès aux fichiers sous une distribution Linux (En sachant que sous Linux, tout est fichier).
Tut's pfSense Archives - computerz.solutions
La commande pwck (password check) est relativement peu connue des sysadmins Linux. Elle est pourtant utile car elle permet de vérifier l'intégrité, c'est à dire la structure, la validité, des fichiers /etc/passwd, /etc/group et /etc/shadow.
With many important things depending on time (think Kerberos), NTP is an important but often forgotten component of your network. Because the NTP daemon for Linux is relatively lightweight, it's rare for bugs to pop up in such a common service.
Samba is a free Open Source software which provides a standard interoperability between Windows OS and Linux/Unix Operating Systems.
Je me suis récemment lancé dans l’aventure de l’auto-hébergement de ma messagerie électronique, et j’ai mis en place un certain nombre de mécanismes afin de lutter contre le spam et l’usurpation d’identité. Parmi ces mécanismes il y en a un qui s’appelle DMARC.
GitHub - drduh/macOS-Security-and-Privacy-Guide: A practical guide to securing macOS.
Je ferai un article dans mon Wiki récapitulant les touches pour faire fonctionner et piloter chacun des outils. Mais voici mon TOP10 des outils tip TOP sous Linux pour le monitoring et performance système ponctuelle
I have used non-standard RSA key size for maybe 15 years. For example, my old OpenPGP key created in 2002. With non-standard key sizes, I mean a RSA key size that is not 2048 or 4096.
Vim is a highly configurable text editor built to enable efficient text editing. It is an improved version of the vi editor distributed with most UNIX systems. Vim is distributed free as charityware.
Dans ce court tutoriel, nous allons voir comment utiliser la commande strace afin de lister tous les fichiers qui sont exécutés lors de l'ouverture d'une session.
I recently tried out OpenBSD as a possible answer to recent Linux engineering. I thought I’d share my notes here on my results, from a beginner’s and Linux user’s perspective. (I tried FreeBSD briefly before as well.) If you’ve used OpenBSD more extensively on the desktop, your feedback on any of this is welcome too – I’d like to know what you think of my opinions, you being a longer-term user.
Lurking in the kernel for nine years, flaw gives untrusted users unfettered root access.
I've used Linux containers directly and indirectly for years, but I wanted to become more familiar with them. So I wrote some code. This used to be 500 lines of code, I swear, but I've revised it some since publishing; I've ended up with about 70 lines more.
My 10 UNIX Command Line Mistakes
OpenZFS Developers Summit 2016 - YouTube