Pluggable Authentication Module (PAM)

Please note these notes are based on CentOS/RHEL 5 – What is PAM ? The glue between authentication methods [eg one-time pwds, kerberos, smart cards] and applications requiring authentication services [eg. ftpd, sshd, imapd] etc It is another layer on 1st-Level defense in Linux. – The 4 directories we are concerned with: /lib/libpam*      [3 files…

LTSP – Concept and Implementation

LTSP is used to setup Linux Thin Clients aka Diskless Clients. It also can be used for Maintenance server or Installation Server in infrastructure. It is very cost effective & highly customizable solution. This article will explain the concepts and implementaion of LTSP.

Bash Scripting – TRAP

Many of us might have faced a stiuation where we have started a script, waiting for its outcome and suddenly someone/ourself do a CTRL+C by mistake to terminate the script. Wouldn’t it be nice if our script becomes ‘immune’ to CTRL+C signal. Here comes ‘trap’ command for help. ‘trap’ command basically traps the signal which…

Preventing Brute Force Attacks with Fail2Ban

If you have FTP or SSH server exposed to internet with static IP, then you may face issue of Brute Force Attack on your FTP or SSH server. In this article, we will learn how to secure our FTP or SSH server from Brute Force Attack

Making a Linux box as Simple router and Firewall

 Scenario:1 One Linux Box as a firewall having 2 Lan cards or 1 lan card and one internet modem connection.2. eth0 –> Connected to Broadband. IP is 192.168.1.2  in case of dialup it can be “ppp0”3. eth1 –> Connected to Local LAN IP is 192.168.2.1Note: In case of broadband your default gateway should be IP…

setsid how to keep commands running after exiting shell prompt

If you need to run any program or command, and then leave the shell session or ssh session, but be sure to leave the command running behind you, then you can use setsid. I know you are going to mention screen and nohup, and yes they are maybe better options, but setsid is another option.…