How to: Linux Iptables block common attacks
IPTables filters and other tricks to prevent common syn-flood and malformed packet attacks on your server.
Unix and Linux network configuration. Multiple network interfaces. Bridged NICs. High-availability network configurations.
Reviews of latest Unix and Linux software. Helpful tips for application support admins. Automating application support.
Disk partitioning, filesystems, directories, and files. Volume management, logical volumes, HA filesystems. Backups and disaster recovery.
Distributed server monitoring. Server performance and capacity planning. Monitoring applications, network status and user activity.
Cool Unix shell commands and options. Command-line tools and application. Things every Unix sysadmin needs to know.
Let’s imagine you need to download all the photos in a Facebook photo album. It can be a public album, a friend’s, or even your own. Sure, you can do this manually, but you probably …
Just a scripting exercise because I need to do something important, but I am procrastinating. The idea is simple: grab some URL with text containing somewhat structured data and convert it into a spreadsheet. I …
On occasion I wondered how to apply advanced photo filters to my lackluster GoPro and drone videos. You know, not the basic exposure/contrast/saturation or the cheesy special effects you find in video editors, but something …
Here are just a few hopefully useful tips for searching Twitter to get more relevant results and buy cheap twitter followers.
Just a scripting exercise because I need to do something important, but I am procrastinating. The idea is simple: grab some URL with text containing somewhat structured data and convert it into a spreadsheet. I …
Sometimes you need dummy folder structures populated with random data for testing your various scripts and processes – backups, file transfers, encryption, compression, etc. Every time I need something like this, I end up writing …
Cron is an indispensable tool for system administration. The difficulties in working with cron in a large environment stem from its decentralized nature. Cron jobs multiply like rabbits, and keeping track of them is not …
This is a depressing – and all-too-common – scenario: a user runs the free command and opens a support case because he sees zero “free” memory on the server.
I have a squid proxy server that uses a long list of authenticated cache peers in a round-robin configuration. The process looks something like this:
I needed to check if SNMP was accessible on whatever live servers that existed in a particular subnet. Here’s a quick script to do this.
Igor
Sr. Unix SysAdmin with twenty years experience supporting Solaris, HP-UX, AIX, IRIX, and Linux servers in a large distributed environment.
Profile Log Out blog admin |