Include 301 redirect into apache httpd.conf – Hostgator hosting

Hostgator VPS generates apache’s httpd.conf file automatically. Therefore, any new lines you add to apache’s configuration file will be overwritten. In order to add new configuration settings we need to include a configuration. Open up your main config file /etc/httpd/conf/httpd.conf and search for a virtual host with the domain name you wish to edit. Last two lines of your virtual host should look similar to this:

# To customize this VirtualHost use an include file at the following location
#    Include "/usr/local/apache/conf/userdata/std/2/linuxcon/linuxconfig.org/*.conf"

uncomment the Include line by remove leading “#”.

Next, create a directory to reflect the Include location:

# mkdir -p /usr/local/apache/conf/userdata/std/2/linuxcon/linuxconfig.org/

Read more

Password cracking with John the Ripper on Linux

Password cracking with John the Ripper on Linux

Introduction

For those of you who haven’t yet heard about John the Ripper (hereby called John for brevity), it is a free password cracking tool written mostly in C. Before going any further, we must tell you that although we trust our readers, we do not encourage or condone any malicious activities that may be performed using this tool or any other tools we talked about in the past. Security-related tools are often like a double-edged sword, in that they can be used for good but also for bad things. So although it might sound tempting, we recommend you to refrain from any damaging activities, if for nothing else, just because you have great chances to land in a jail cell. Password cracking with John the Ripper on LinuxThis article will deal with John from a system administrator’s perspective, so we expect you to have intermediate knowledge about your Linux system, whatever distribution that may be, and that you are a security-conscious person with basic security knowledge. However, this article might appeal to you also if you are a home user wanting to learn about these kind of things, but be warned: some of the commands presented below will ask a great deal of your CPU time, so maybe it would be better if you had a test machine and/or lots of time and patience, because password cracking attempts may take days, even on a relatively new machine. As usual please refer to our new Linux Forum for additional help or information.

Read more

Kickstart GUI

Automating Linux installations with Kickstart

Introduction

Red Hat, and their community effort, Fedora, are more or less enterprise-oriented. That being said, it’s only natural they offer enterprise-specific tools that don’t quite make sense on other desktop oriented operating systems. In the enterprise environment, where the system administrator has to manage lots of machines and installations, one tool that helps a lot is one that facilitates automated installations on several computers, using the same options for each of them. Instead of installing each system separately, the administrator just boots the installation media, tells the system where to find the options for installation and comes back after an hour to check on the system. It’s a tremendous advantage in terms of time and effort, especially when dealing with lots of systems. Just like HP-UX offers Ignite or OpenSUSE offers AutoYAST, Red Hat/Fedora offers Kickstart. You will learn what that is, how to get the best of it and how to use the newly created Kickstart file. We assume basic knowledge of Linux and we recommend you try this in a virtual machine first before going into production.

Read more

Select x11vnc port window

How to share your desktop in Linux using x11vnc

Objective

Learning how to share you desktop using the vnc protocol and the x11vnc application

Requirements

  • Having the x11vnc package installed

Conventions

  • # – requires given command to be executed with root privileges either
    directly as a root user or by use of sudo command
  • $ – given command to be executed as a regular non-privileged user

Introduction

While ssh is a vital tool for every system administrator, being it the most used and secure protocol for remote administration, even capable to grant access to the X11 display server, via X11 forwarding, it is not the right tool to use when the desired target is to share an entire desktop session. In that case the vnc protocol is our friend. By using it, we can completely control another machine, sharing even keyboard or mouse events.

Read more

Install OpenCL For The AMDGPU Open Source Drivers On Debian and Ubuntu

Objective

Install the OpenCL portion of the AMDGPU-PRO drivers on Debian and Ubuntu.

Distributions

Debian and Ubuntu

Requirements

A working install of Debian or Ubuntu with root privileges

Conventions

  • # – requires given linux command to be executed with root privileges either directly as a root user or by use of sudo command
  • $ – given linux command to be executed as a regular non-privileged user

Introduction

The proprietary AMDGPU-PRO drivers only support a select small subset of Linux distributions. Non-LTS Ubuntu releases aren’t supported, and Debian users are completely out of luck. To make things worse, AMD doesn’t provide OpenCL support through their open source drivers.

There is good news. You can install just the OpenCL parts of the AMDGPU-PRO drivers on your Debian or Ubuntu system using the packages provided by AMD. There’s a very specific way that you need to go about it, but it can be done, making things like mining cryptocurrency on an AMD card possible.

WARNING: This may interfere with your existing drivers, resulting in poor performance and instability. Proceed with caution.

Read more

dd-manpage

How dd command works in Linux with examples

Dd is a very powerful and useful utility available on Unix and Unix-like operating systems. As stated in its manual, its purpose is to convert and copy files. On Unix and Unix-like operating systems like Linux, almost everything is treated as a file, even block devices: this makes dd useful, among the other things, to clone disks or wipe data. The dd utility is available out of the box even in the most minimal installation of all distributions. In this tutorial we will see how to use it and how we can modify its behavior by using some of the most commonly used options to make your Linux system administration job easier.

In this tutorial you will learn:

  • How to use dd
  • How to modify the program behavior by using some of the most commonly used options

Read more

How to Encrypt and Decrypt Individual Files With GPG

Objective

Encrypt individual files with GPG.

Distributions

This will work with any Linux distribution.

Requirements

A working Linux install with GPG installed or root privileges to install it.

Conventions

  • # – requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
  • $ – requires given linux commands to be executed as a regular non-privileged user

Introduction

Encryption is important. It’s absolutely vital to protecting sensitive information. Your personal files are worth encrypting, and GPG provides the perfect solution.

Read more

Introduction to the Linux kernel log levels

Objective

The objective of this tutorial is to learn about the various linux kernel log levels, how they are organized, and how we can setup what messages should be displayed on the console depending on their severity.

Requirements

  • Root privileges to edit configuration files

Difficulty

EASY

Introduction

The management of Linux kernel log files is one crucial aspect of a machine administration: logs can simply inform us about the state of daemon, or show critical messages or warnings. In this tutorial, we will see the various type of log level used by the linux kernel, how they are organized by severity and how we can filter messages displayed on the console depending on it.

Read more

MySQL workbench dashboard on Ubuntu Linux

Install and Configure MySQL Workbench on Ubuntu Linux

MySQL workbench is a graphical application which let us manage data and perform administrative tasks on MySQL databases. In this tutorial we will see how to install the program on Ubuntu 18.04 (Bionic Beaver) and we will perform a brief tour of some of its most basic functionalities to make your Linux system administration job easier.

In this tutorial you will learn:

  • How to install and configure MySQL workbench
  • How to create a schema and a table via MySQL workbench
  • How to crate an E.R diagram by reverse-engineering an existing schema
  • How to execute SQL queries

Read more

How to monitor file integrity on Linux using Osquery

How to monitor file integrity on Linux using Osquery

The basic concept involved with the use of the osquery application is the “tabular abstraction” of many aspects of the operating system, such as processes, users, etc. The data is stored in tables which can be queried using SQL syntax, directly via the osqueryi shell, or via the osqueryd daemon.

In this tutorial we will see how to install the application, how to run basic queries, and how to use FIM (File Integrity Monitoring) as part of your Linux system administration job.

In this tutorial you will learn:

  • How to install osquery
  • How to list the available tables
  • How to perform queries from the osqueryi shell
  • How to use the osqueryd daemon to monitor file integrity

Read more

Firefox's about page displaying the version number

Play Netflix on Linux with Firefox

Introduction

Netflix and Linux have a somewhat troubled past. For years, Netflix actively blocked Linux users. More recently, support for Google Chrome was added. Firefox users, however, have been out of luck until just recently. As of Firefox 49, the option of using Google’s DRM from the Chrome browser to play DRM content has been made optionally available to Firefox users. This has made it possible to watch Netflix, and potentially other DRM streaming services, using Firefox and without installing Google Chrome. What’s better, the DRM can be turned off when you’re done watching.

Read more