Collecting Ubuntu Linux System Information

Posted on in Categories Command Line Hacks, Hardware, Howto last updated September 2, 2015

For new computer or Laptop or server, I need to collect the information about its hardware. This is also useful when you need to replace a disk or memory with a vendor. In order to replace hardware you need all information in advance. In this post, I’m going to list commands that you can use to collect the hardware information.
Ubuntu Linux Server Collecting System Information

Linux Tutorial: Install Ansible Configuration Management And IT Automation Tool

Posted on in Categories Datacenter, Hardware, Open Source, Python last updated October 1, 2014

Today I will be talking about ansible, a powerful configuration management solution written in python. There are many configuration management solutions available, all with pros and cons, ansible stands apart from many of them for its simplicity. What makes ansible different than many of the most popular configuration management systems is that its agent-less, no need to setup agents on every node you want to control. Plus, this has the benefit of being able to control you entire infrastructure from more than one place, if needed. That last point’s validity, of being a benefit, may be debatable but I find it as a positive in most cases. Enough talk, lets get started with Ansible installation and configuration on a RHEL/CentOS, and Debian/Ubuntu based systems.

Installing Tails Live Linux Operating System For Preserving Privacy and Anonymity On The Net

Posted on in Categories Open Source, Security last updated October 1, 2014

Nowadays, privacy does not hold much value when it comes to the privacy of our data on our digital devices or on the internet. In the past few weeks, we learned that everyone who tries to maintain privacy on the net is under suspicion which is all the more reason to try to keep our data, contacts, communications, and whereabouts on the internet anonymous and hidden from prying eyes as much as possible. This holds true even more for people that are more exposed like human rights activists, journalists, lawyers, and even doctors. Some of the distributions that try to assist us with this build on the Tor network.

Download of The Day: Debian Linux 7 ( Wheezy )

Posted on in Categories Debian Linux, Linux News, Open Source last updated April 25, 2015

Debian GNU/Linux version 7.0 Wheezy has been released ( jump to download ) after many months of constant development and available for download in various media format. Debian 7.0 is a free operating system includes various new features such as multiarch support, several specific tools to deploy private clouds, an improved installer, and a complete set of multimedia codecs and front-ends which remove the need for third-party repositories.

Download of the day: Kali Linux ( BackTrack Linux )

Posted on in Categories Linux News, Open Source, Security last updated March 19, 2013

Kali Linux is the successor of the BackTrack Penetration Testing Linux distribution has been released. From the official project page:

Kali is a complete re-build of BackTrack Linux, adhering completely to Debian development standards. All-new infrastructure has been put in place, all tools were reviewed and packaged, and we use Git for our VCS.

Solaris / Linux: nicstat Command Show Network Interface Card Statistics

Posted on in Categories Command Line Hacks, Hardware, Networking last updated March 13, 2013

nicstat-welcomeThe nicstat command is top like utility for network interface card (NIC). It displays information and statistics about all your network card such as packets, kilobytes per second, average packet sizes and more. It works under Solaris and Linux operating systems.

In this post, I will explain how to install and use the nicstat command to find out stats about your NICs under Debian / Ubuntu / RHEL / CentOS Linux operating systems.

Amazon Cloudfront Dynamic Content Delivery With A WordPress Blog

Posted on in Categories Amazon Web Services, Content Delivery Network last updated March 7, 2013

A typical Wordpress blog contains a mix of static stuff such as images, javascript, style sheets and dynamic content such as posts, pages and comments posted by users. You can speed up your blog by serving static content via content delivery network such as Akamai, Edgecast and so on. The big boys of CDN business also offered the solution to accelerate dynamic content to improve the performance and reliability of the blog. However, solutions offered by big and traditional CDNs are expensive. Amazon cloudfront recently started to serving dynamic content at lowered price. In this blog post, I will explain:

  1. How to serve your entire blog using cloudfront.
  2. DNS settings.
  3. Wordpress settings.
  4. Documenting limitations of cloudfront.
  5. Documenting performance improvements.

Linux / Unix: Install and Use Geany Integrated Development Environment

Posted on in Categories Howto, Open Source, Programming, Reviews, Web Developer last updated January 13, 2013

Geany is a great and light weight cross-platform integrated development environment for Linux and Unix based systems. It supports C, C++, Java, PHP, Python and 50+ other programming languages. Geany is known to run under Linux, FreeBSD, NetBSD, OpenBSD, MacOS X, AIX v5.3, Solaris Express and Windows. Geany more closely resembles programming editors available for Microsoft Windows such as Notepad++. So if, you are switching from MS-Windows to Ubuntu/Debian/Fedora/Mint or BSD/OS X/Unix like platform try geany IDE.

Top 30 Nmap Command Examples For Sys/Network Admins

Posted on in Categories Command Line Hacks, Howto, Networking, Security last updated January 13, 2017

Nmap is short for Network Mapper. It is an open source security tool for network exploration, security scanning and auditing. However, nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users.

The purpose of this post is to introduce a user to the nmap command line tool to scan a host and/or network, so to find out the possible vulnerable points in the hosts. You will also learn how to use Nmap for offensive and defensive purposes.