background preloader

3 Steps to Perform SSH Login Without Password Using ssh-keygen & ssh-copy-id

3 Steps to Perform SSH Login Without Password Using ssh-keygen & ssh-copy-id

Packet Analyzer: 15 TCPDUMP Command Examples tcpdump command is also called as packet analyzer. tcpdump command will work on most flavors of unix operating system. tcpdump allows us to save the packets that are captured, so that we can use it for future analysis. The saved file can be viewed by the same tcpdump command. We can also use open source software like wireshark to read the tcpdump pcap files. In this tcpdump tutorial, let us discuss some practical examples on how to use the tcpdump command. 1. When you execute tcpdump command without any option, it will capture all the packets flowing through all the interfaces. $ tcpdump -i eth1 14:59:26.608728 IP xx.domain.netbcp.net.52497 > valh4.lell.net.ssh: . ack 540 win 16554 14:59:26.610602 IP resolver.lell.net.domain > valh4.lell.net.24151: 4278 1/0/0 (73) 14:59:26.611262 IP valh4.lell.net.38527 > resolver.lell.net.domain: 26364+ PTR? In this example, tcpdump captured all the packets flows in the interface eth1 and displays in the standard output. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11.

mycli How to turn your Ubuntu 14.10 headless server into a XFCE + VNC Network Desktop This tutorial describes the installation of Gnome 3, XFCE and VNC on a headless server (server without monitor) to turn it into a Linux Desktop that you can access from anywhere over the internet with VNC. The server that is used for this setup is a root server in a datacenter that runs just a minimal Ubuntu 14.10 operating system. I will guide you trough the installation and configuration of the following software: Ubuntu 14.10 Gnome 3.14 VNC 4.1.1 Important Notes: This procedure is only applicable to a new installed Ubuntu Linux OS, if you have existing running Ubuntu Linux with a different version where you like to install a desktop and vnc, i suggest you make a backup of your system and after that, you may proceed with this procedure. WARNING: The VNC protocol does not encrypt the transmitted data or login details, use a VPN tunnel if you plan to use it over a insecure or public network. 1. First we install some prerequisites for installing Ubuntu PPA repositories: to load the gpg key.

Copy/Transfer Files Between Two Linux Servers Using SCP | John Veldboom The other day we ran into a good problem that our site has grown and we are in need of a new server. So we ordered the server and now we need to transfer all the files from the old server to the new one. But rather than downloading all the files to our local machines then re-cuploading them to the new server, we're going to show you how you can skip the middle man and transfer files from server to server. The only requirements is that you need to have SSH access to both servers. We're going to be using the Linux command scp which stands for secure copy. We're going to be using the following options: r = recursively copy entire directories C = compression enable p = preserves modification times, access times, and modes from the original file Also, if you're going to transfer a lot of data between the webservers, you probably want to add the nohup command too. nohup runs a command even if the session is disconnected or the user logs out. Hope this helps someone as much as it did me today.

Training Locally Hosted Classes Welcome Why? Training Games ChangeBlog External Resources Submit Content Current stats: 63 days of open source class materials 29 classes (13 with videos) 24 instructors Beginner Classes: •Android Forensics & Security Testing •Certified Information Systems Security Professional (CISSP)® Common Body of Knowledge (CBK)® Review •Flow Analysis & Network Hunting •Hacking Techniques and Intrusion Detection •Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration •Introductory Intel x86-64: Architecture, Assembly, Applications, & Alliteration •Introduction to ARM •Introduction to Cellular Security •Introduction to Network Forensics •Introduction to Secure Coding •Introduction to Vulnerability Assessment •Introduction to Trusted Computing •Offensive, Defensive, and Forensic Techniques for Determining Web User Identity •Pcap Analysis & Network Hunting •Malware Dynamic Analysis •Secure Code Review •Smart Cards •The Life of Binaries •Understanding Cryptology: Core Concepts

Unix LS Command: 15 Practical Examples ls – Unix users and sysadmins cannot live without this two letter command. Whether you use it 10 times a day or 100 times a day, knowing the power of ls command can make your command line journey enjoyable. In this article, let us review 15 practical examples of the mighty ls command. 1. To open the last edited file in the current directory use the combination of ls, head and vi commands as shown below. ls -t sorts the file by modification time, showing the last edited file first. head -1 picks up this first file. $ vi first-long-file.txt $ vi second-long-file.txt $ vi `ls -t | head -1` [Note: This will open the last file you edited (i.e second-long-file.txt)] 2. To show single entry per line, use -1 option as shown below. $ ls -1 bin boot cdrom dev etc home initrd initrd.img lib 3. To show long listing information about the file/directory. $ ls -l -rw-r----- 1 ramesh team-dev 9275204 Jun 13 15:27 mthesaur.txt.gz 1st Character – File Type: First character specifies the type of the file. 4. 5.

python-keepassx — keepassx 0.1.0 documentation KeePassX is a cross platform password manager. However, KeePassX is a desktop GUI application. That's where python-keepassx comes in. By using python-keepassx, you can access your passwords using a command line interface to KeePassX. You can also use the python library directly in your own python applications. Python-keepassx: simple, command line interface to your passwords. $ kp get github Password: title: GitHub username: jamesls url: notes: Password has been copied to clipboard. See the Getting Started Guide to start using python-keepassx now. What is this project and why should I care? Keepassx is a great password manager. What's a Password Manager? We use things that require passwords. If you're following password best practices, you should not be using the same password for more than one site. That's where a password manager comes into play. I've never hard of KeePassx, what is it? KeePassX is a password manager. FreeCross platformOpen source Yes.

GNU/Linux (en) Checking Running Services on Linux Is the program running? The first step in troubleshooting a network service is to make sure the program is running. service To check that the program is running we will start by using the command 'service'. Service names The service command references a service using its init script, stored in the /etc/init.d directory. Some names vary depending on your distribution - apache is 'httpd' on CentOS, for exampe, while it's 'apache2' on Ubuntu. Service status The following example shows how to check the status of httpd on CentOS using the service command. $ sudo service httpd status httpd is stopped Service control If a service isn’t running you can use service to start it. $ sudo service httpd start Starting httpd: [ OK ] If the application cannot be started the service command will report the failure and usually show a message explaining the reason. netstat In the example above httpd cannot be started because something is already listening on the port. Checking again Continuing onward

Dragon Internet Browser – Comodo Dragon Web Browser Internet is the world's foremost communicative medium. Each day, the volume of messages it transmits, the tidal wave of credentials, ID numbers and passwords it requires, the preponderance of data it exhibits, and the endless array of transactions it helps consummate is unsurpassed! The Internet has grown up and of course the sophistication of millions of hackers, scammers, phishers and thieves has grown too. Today's Web users require MORE than a Browser that is faster, nimbler and more stable. The Secrets Of Comodo Dragon Browser This is exactly why Comodo, the world's leading online security and trust assurance innovator, has stepped forward with Comodo Dragon. – A Chromium technology-based Browser that offers you all of Chrome's features PLUS the unparalleled level of security and privacy you only get from Comodo. System RequirementsWindows 8 / Windows 7 / Vista / XP, 128 MB RAM and 40 MB Hard Disk Space What makes Comodo Dragon THE Browser for the new decade? Comodo Dragon Security:

15 Examples To Master Linux Command Line History When you are using Linux command line frequently, using the history effectively can be a major productivity boost. In fact, once you have mastered the 15 examples that I’ve provided here, you’ll find using command line more enjoyable and fun. 1. Display timestamp using HISTTIMEFORMAT Typically when you type history from command line, it displays the command# and the command. # export HISTTIMEFORMAT='%F %T ' # history | more 1 2008-08-05 19:02:39 service network restart 2 2008-08-05 19:02:39 exit 3 2008-08-05 19:02:39 id 4 2008-08-05 19:02:39 cat /etc/redhat-release 2. I strongly believe, this may be your most frequently used feature of history. # [Press Ctrl+R from the command prompt, which will display the reverse-i-search prompt] (reverse-i-search)`red': cat /etc/redhat-release [Note: Press enter when you see your command, which will execute the command from the history] # cat /etc/redhat-release Fedora release 9 (Sulphur) 3. 4. 5. Type ! # ! 6. 7. 8. 9. 10. 11. # history -c 12. 13. 14.

SSH Can Do That? Productivity Tips for Working with Remote Servers | Smylers SSH has many features which are helpful when working regularly with files on remote servers; together they can give a vast increase in productivity over the bare use of SSH. If you regularly use SSH, it’s worth spending a little time learning about these and configuring your environment to make your life easier. This has been presented at presented at Yapc Europe 2011 in Riga and the Floss UK Spring 2012 Conference in Edinburgh. If you’d like me to come and talk about this at your user group or workplace, please get in touch. Multiple Connections Often it’s useful to have multiple connections to the same server, for example to edit a file, run some file-system commands, and view a log file all in different terminal windows. Fortunately OpenSSH has a feature which makes it much snappier to get another terminal on a server you’re already connected to: connection sharing. ControlMaster auto ControlPath /tmp/ssh_mux_%h_%p_%r What About Windows Users? Copying Files Repeated Connections $ ssh www2

Ubuntu Mini Remix - The tiny Ubuntu you can build on!

Related: