Find the answer to your Linux question:

Search:

Type: Posts; User: gtmtnbiker98; Keyword(s):

Page 1 of 20 1 2 3 4

Search: Search took 0.02 seconds.

  1. Replies
    2
    Views
    1,362

    If you make the needed VMWare changes, it is...

    If you make the needed VMWare changes, it is advisable to restart the system.
  2. Replies
    0
    Views
    693

    Apache2 Problems

    This is strange. Currently running a Web server on Ubuntu 10 LTS. Current Web site is *.htm file extensions. The new site that I'm trying to put in place is running *.html extensions. I don't...
  3. Replies
    7
    Views
    1,855

    Okay, sounds to me like your routing tables maybe...

    Okay, sounds to me like your routing tables maybe the issue and/or (more likely) the appropriate protocols have not been properly configured in IP Tables. Have you allowed the protocols and the...
  4. Replies
    7
    Views
    1,855

    What are you using to attempt a remote...

    What are you using to attempt a remote connection? What distro are you using?
  5. Replies
    4
    Views
    2,405

    If you are going to run a business Web site from...

    If you are going to run a business Web site from this box, isn't it wise to invest a little in the hardware and run a more robust and capable machine? Just food for thought. As to your questions,...
  6. Replies
    3
    Views
    2,294

    I use VSFTPD.

    I use VSFTPD.
  7. Replies
    22
    Views
    2,851

    Format the HDD and reinstall the OS. Then patch...

    Format the HDD and reinstall the OS. Then patch the OS and install AV and the hacker will be gone. Sorry, but why live with a cracked PC when it's so easy to fix?!?
  8. Replies
    4
    Views
    1,203

    Other than applying security updates using apt,...

    Other than applying security updates using apt, you should be good to go. The beauty of Linux' file systems is that you don't have to "defrag" as compared to NTFS and FAT file systems. If it's not...
  9. Replies
    3
    Views
    1,446

    You should at least prepare the RHEL machine with...

    You should at least prepare the RHEL machine with a base install of Samba. Once installed, create your directories for which you want to share. Once created, create the necessary Unix user accounts...
  10. Replies
    4
    Views
    2,536

    No, use a VPN connection and then use SMB/CIFS.

    No, use a VPN connection and then use SMB/CIFS.
  11. Replies
    2
    Views
    1,769

    Passwords "should" automatically be encrypted -...

    Passwords "should" automatically be encrypted - note the presence of /etc/shadow. In my experiences, there isn't a need for any type of argument(s) when adding regular user accounts.
  12. I also forgot to metion cat and tail -f for...

    I also forgot to metion cat and tail -f for viewing log files. The tail -f is very useful for administration.
  13. ls cp rm ps top mkdir useradd passwd...

    ls
    cp
    rm
    ps
    top
    mkdir
    useradd
    passwd
    smbpasswd
    man
  14. Replies
    2
    Views
    2,443

    Open SuSE to the best of my knowledge does not...

    Open SuSE to the best of my knowledge does not employ SE Linux. SE Linux is a Red Hat headache.
  15. Replies
    25
    Views
    5,285

    Is it good for Linux in general?

    Is it good for Linux in general?
  16. Replies
    2
    Views
    1,018

    Enable port:53 in any firewall and yes, disable...

    Enable port:53 in any firewall and yes, disable SE Linux.
  17. Replies
    3
    Views
    1,505

    Don't perform criminal acts and you'll be fine.

    Don't perform criminal acts and you'll be fine.
  18. Replies
    16
    Views
    3,050

    I am the exact opposite when considering SuSE and...

    I am the exact opposite when considering SuSE and FC. I for one cannot stand FC, don't really have a reason, but I simply don't like it. If I'm after a RH clone than I simply use CentOS. On the...
  19. Replies
    10
    Views
    1,504

    That's a lot of failed logins! Type ps aux at...

    That's a lot of failed logins! Type ps aux at the console and look for process ID pid=31221, 9815 and 9816. Check the resources and issue the kill command for this process and see if you can...
  20. Replies
    10
    Views
    1,504

    After reading your logs, the server is...

    After reading your logs, the server is experiencing a brute force attack on SSHD. Look at the random usernames and failed logins. This could be consuming some resources but more than likely not...
  21. Replies
    11
    Views
    1,420

    Download and configure BIND-9 with the distro of...

    Download and configure BIND-9 with the distro of your choice.
  22. Replies
    3
    Views
    3,501

    When working with domain accounts, under Control...

    When working with domain accounts, under Control Panel click on User Accounts and add the appropriate domain accounts and set their privilege level this way. This will allow for domain logons...
  23. Replies
    3
    Views
    3,501

    Create local admin privileges for the users that...

    Create local admin privileges for the users that need to install software.
  24. Oracle will push Linux popularity down to the...

    Oracle will push Linux popularity down to the business user. People tend to employ similar applications at home as they do at work. You won't see widespread adoption by SOHO users until business'...
  25. Thread: Security

    by gtmtnbiker98
    Replies
    2
    Views
    920

    If I'm not mistaken, the NSA was using Red Hat...

    If I'm not mistaken, the NSA was using Red Hat Linux in addition to SE Linux. As for the step-by-step, I don't have a clue.
Results 1 to 25 of 500
Page 1 of 20 1 2 3 4