≡ Menu

Linux

How to Install and Configure Linux NTP Server and Client

NTP stands for Network Time Protocol. It is used to synchronize the time on your Linux system with a centralized NTP server. A local NTP server on the network can be synchronized with an external timing source to keep all the servers in your organization in-sync with an accurate time. I. Configure NTP server 1. [...]

{ 13 comments }

How to Setup Linux Etherchannel Bonding for Network Interface HA

In Linux, using etherchannel bonding you can combine two or more physical network interfaces (NIC) together to create a virtual interface. The IP address will be configured on this virtual interface. If one of the underlying physical adapters goes down, then the other physical adapter is used to handle the communication traffic. The following are [...]

{ 6 comments }

We have ntbackup in Windows where we can take the “system state backup” for backing up the domain controller. This tutorial explains how we can backup the Samba configuration, after you’ve setup Samba as active directory domain controller in Linux. First, we need to understand what files and folders we are going to backup, and [...]

{ 0 comments }

Readline also provides you with the ability to map your own custom keybindings by editing the .inputrc configuration file in your home directory. The following are two types of custom keybindings you can define: Macros Functions Macros You can define a keybinding that will, when executed, fill in a string of characters at the cursor’s [...]

{ 5 comments }

How to Install Kerberos 5 KDC Server on Linux for Authentication

Kerberos is a network authentication protocol. Kerberos provides a strong cryptographic authentication against the devices which lets the client & servers to communicate in a more secured manner. It is designed to address network security problems. When firewalls acts a solution to address the intrusion from the external networks, Kerberos usually used to address the [...]

{ 0 comments }

This tutorial explains few practical and useful scenarios in using the tshark command. You’ll understand how to auto-save captures to multiple files, auto-save captures based on time limits, specify your own buffer size for capture, extract specific fields from the capture, and display statistics for a specific protocol from a capture. 1. Auto-save Captures to [...]

{ 1 comment }

A keybinding is simply the mapping of a specific key combination to an action. Keybindings that we are all familiar with outside of the command line environment are things like: Control-c: copies selected text Control-v: pastes copied text In this tutorial, we’ll take a look at some of the default keybindings provided in the command [...]

{ 11 comments }

Wireshark is an open-source packet analyser used for network analysis. It can capture, dissect, and decode various protocols. In this tutorial we will discuss couple of problematic scenarios and how to use wireshark command line tools to analyse the packet. Scenario 1: Using non-standard Port with tshark for Analysis Wireshark can dissect and decode the [...]

{ 2 comments }