Linux System Administration 32
SELinux Introduction In CentOS 7
What is SELinux? Security-Enhanced Linux (SELinux) was developed to provide access control for linux. It goes beyond file permissions and ACLs to create a more secure environment by limiting access. It is based on subjects, objects, and actions. A subject is the running command or application(example proftpd), the object is anything that can be accessed […]
FirewallD Introduction On CentOS 7
What is FirewallD? Firewalld was introduced in CentOS 7/ RHEL 7 with both a GUI and command line interface for making changes. It is a alternative for using IPtables. If offers a zone based firewall configuration that allows you to enable different zones with different levels of trust. Different Zone possibilities Zones change be changed, […]
Recover A Root Password On CentOS
To recover the root password on a linux system if you do not have it have misplaced it depends on the major release of the OS. This guide will cover both CentOS 6(and prior releases) and CentOS 7. Recover a root password on CentOS 6 or older You will need to boot into single user mode. […]
Iptables Introduction and Examples
Iptables is a firewall service included in CentOS, in CentOS 7 its offered as a alternative firewalld is offered as well. Iptables uses netfilter to filter chains. Essentially you create a chain of filter rules to process how incoming and outgoing data is handled. You can view more about iptables on Netfilter Iptables rule format […]
ModSecurity Installation With Apache On CentOS
ModSecurity is an open source monitoring system for web applications. It has powerful rule sets that allow you to protect applications from attacks. View the project for more details. It provides a ton of features such as: More than 16,000 specific rules, broken out into the following attack categories: * SQL injection * Cross-site Scripting (XSS) […]
mod_auth_token Installation In Apache
mod_auth_token is a apache module that can be used to sign URLs, using this it can create time based urls that expire after a certain amount of time. It will prevent hot linking as the URLs will expire. This is particularly useful with video and image sharing. To get started you will need to have […]
Virsh KVM Commands For Management
Virsh is a command line executable to control existing virtual machines. It includes a number of commands to help manage KVM(kernel-based virtual machine) instances. It allows for easy command line management often remotely of virtual machines through SSH access. To enter the command shell over ssh just type the following: virsh From there you can type […]
Most Commented