Installation of KVM and Eve-NG Kernel-based Virtual Machine or KVM is an open source virtualization solution that can make your Linux Server as hypervisor. I will demonstrate also how to install Virtual Machine (VM), for...
Category - Tutorials
Tutorials
Want to deploy Openstack and experience your own cloud platform the easier way? One way is to install Openstack via RDO Packstack*. *Packstack is a utility that uses Puppet modules to deploy various parts of OpenStack . It is...
It is meant to function as a staging or testing server where you can do compatibility test latest wordpress version on your existing sites, or try themes, plugins,widgets or practice your coding skills in css & php before...
Here’s the list of basic commands a Linux user needs to know and familiarize for them to feel comfortable in working with command line interface/shell/terminal. We all know that mostly all Linux distribution now comes...
I got the chance to configure one of the old system of my friend running Windows 2000 and Ubuntu 7, (yes it’s not typo) and he wants to authenticate some of his old Ubuntu PCs to Windows AD. Here’s the tutorial for...
Scenario: Multiple network interfaces in your server and each connected to different network and getting the IP via DHCP Objective: Make all IP pingable and accessible remotely e.g. SSH Solution: Configure Gateway Routing or...
Objective: to copy/send or tee packets coming from enp3s4f1 and send to a destination IP via the enp3s4f0 management/data port ServerA = enp3s4f1 (connected to a switch1 span port) (no IP address) enp3s4f0 (connected to...
Installation & Setup of Free Tacacs+ server in Linux (Tested via GNS3 & VirtualBox) Software Used: GNS3 0.8.3.1 -use 3700 IOS as Router & DHCP -use Ethernet switch to connect hosts -use VirtualBox guest running on...
For the tutorial “Securing your OpenSSH server in Linux” , key-based authentication is one way to secure your SSH server. Below are the details how it’s done: Users can login remotely to Secure Shell(SSH) server...
Secure Shell (SSH) is a program used to secure communication between two entities, often used as a replacement for Telnet and the Berkeley protocols such as remote shell (RSH) and remote login (Rlogin). SSH is also used as a...