Posts

DOMAIN AND SSL

virtual host configuration in Linux:

1. Buy a domain from godaddy etc.
2. Must have server to host this domain with static IP.
3. After buying this domain update dns records/name server in go daddy(name server of your service provider where you buy a server)
4.Now create zone for your domain to update records A etc in name server of your service provider where you buy a server and this name server is managed by sp so you need to ask them to update.
Note: There can be two different name servers for zones (DNS-forward, RDNS-reverse)
5.Now as usual install package httpd,apache,ngnix,tomcat (different webservers) in the server.
6.for ex , for http go to virtual host conf file and add this domain(check online for more info)

SSL configuration in Linux:

1.Generate csr and private key to ssl provider
2.They give crt file,bundle file once you purchase
3.Before step 4 you should have crt file  which is saved domain.crt(mycloud.com.crt),bundle file and key
4.Now in the server install ssl module…

Power Broker

Every server running in your IT environment needs an account, and every account requires privileges.

Many organizations take inadequate steps in managing privileged accounts – leaving them vulnerable to attack and opening the door to potentially devastating data breaches.

Today, most breaches start with people installing something they shouldn’t, connecting to somewhere they shouldn’t, or accessing data they shouldn’t. What does all of this have in common? Privilege misuse and abuse.

When users need elevated privileges on a Unix or Linux server, security admins often turn to free tools like Super User Do, or Sudo (“soo-doo”).

Sudo enables privileged access without exposing the root password.

But it has flaws.

Like limited granularity, lack of data integrity and no log security.

Its policies typically need to be managed on each server, making it hard to lock down and prone to tampering.

With this ad-hoc tool, it’s virtually impossible to maintain security and compliance in complex e…

Tripware_introduction

BOOT_PROCESS_LINUX

NIC BONDING

YUM ROLL BACK

OS HARDNING

Core skills to become unix admin

variables in shell scripting

variables in shell scripting:Shell variables are created once they are assigned a value. A variable can contain a number, a character or a string of characters. Variable name is case sensitive and can consist of a combination of letters and the underscore "_". Value assignment is done using the "=" sign. Note that no space permitted on either side of = sign when initializing variables.
EX: PRICE_PER_APPLE=5 MyFirstLetters=ABC greeting='Hello world!'1. A backslash "\" is used to escape special character meaningEX:PRICE_PER_APPLE=5 echo"The price of an Apple today is: \$HK$PRICE_PER_APPLE"o/p: The price of an Apple today is: $HK 5 2. Encapsulating the variable name with ${} is used to avoid ambiguityEX:MyFirstLetters=ABC echo"The first 10 letters in the alphabet are: ${MyFirstLetters}DEFGHIJ"o/p: The first 10 letters in the alphabet are: ABCDEFGHIJ  3. Encapsulating the variable name with "" will preserve any…

Linux File Systems: Ext2 vs Ext3 vs Ext4 vs Xfs