Category Archives: Linux How-To

Enabling command line arguments in NRPE 2.15

In their infinate wisdom when NRPE was updated we again lost command line arguments. If you are like me and run Nagios commands with arguments from the main server you will need to re-enable this on new servers you install … Continue reading

Posted in Linux How-To, News and Security | Tagged , , | Leave a comment

MySQL Change root Password

How do I change MySQL root password under Linux, FreeBSD, OpenBSD and UNIX-like like operating system over the ssh session? Setting up MySQL password is one of the essential tasks. By default, root user is MySQL admin account user. Please … Continue reading

Posted in Linux How-To | Leave a comment

Tcpdump usage examples

In most cases you will need root permission to be able to capture packets on an interface. Using tcpdump (with root) to capture the packets and saving them to a file to analyze with Wireshark (using a regular account) is … Continue reading

Posted in Linux How-To, Networking, News and Security, Windows How-To | Leave a comment

FreeBSD File System Quotas

17.11.┬áDisk Quotas Disk quotas can be used to limit the amount of disk space or the number of files a user or members of a group may allocate on a per-file system basis. This prevents one user or group of … Continue reading

Posted in Linux How-To | Leave a comment

Hylafax-IAXModem-Elastix-Avantfax Slow reloading fix

This is one that plagued me for a while. Unfortunately the fix was not found anywhere that I could locate. We run eFax servers that utilize Elastix (Build on top of FreePBX), Hylafax, IAXModem, and Avantfax for a front end. … Continue reading

Posted in Linux How-To | Tagged , , , | Leave a comment

Netstat – Examples used for finding DDOS

netstat -na This display all active Internet connections to the server and only established connections are included. netstat -an | grep :80 | sort Show only active Internet connections to the server on port 80, this is the http port … Continue reading

Posted in Linux How-To, News and Security | Leave a comment

How To Protect your Linux Server Against the GHOST Vulnerability

On January 27, 2015, a GNU C Library (glibc) vulnerability, referred to as the GHOST vulnerability, was announced to the general public. In summary, the vulnerability allows remote attackers to take complete control of a system by exploiting a buffer … Continue reading

Posted in Linux How-To | Leave a comment

Amanda Cheat Sheet

Config The workings of Amanda all center around one or more config directories you set up We currently have only one configuration set up to dump all the workstations and it is called allAll of the Amanda commands need the … Continue reading

Posted in Linux How-To | Leave a comment

How to Protect your Server Against the Shellshock Bash Vulnerability

On September 24, 2014, a GNU Bash vulnerability, referred to as Shellshock or the “Bash Bug”, was disclosed. In short, the vulnerability allows remote attackers to execute arbitrary code given certain conditions, by passing strings of code following environment variable … Continue reading

Posted in Linux How-To | Leave a comment

Blocking a DNS DDOS using the fail2ban package

how you can reject these DDOS attempts via the fail2ban package. These events look something like this: System Events =-=-=-=-=-=-= Jan 21 06:02:13 www named[32410]: client 66.230.128.15#15333: query (cache) +’./NS/IN’ denied Tired of your DNS server being used as someone’s … Continue reading

Posted in Linux How-To | Leave a comment