linux Archive

Working with Amazon AWS VPC: Software-based VPN Part 3

Welcome back !! Let’s finally finish this serie and maybe blow your mind with possible scenarios that may happen while you are Troubleshooting, so take a good cup of tea/coffee, and enjoy the reading. If you happened to see this article first, please make sure you read  Part I and Part II, otherwise you may get… [read more]

Read More…

Working with Amazon AWS VPC: Software-based VPN Part 2

Hey! Glad you’ve done this far (or at least jumped straight to the Part II to start configuring OpenSWAN). One thing that I forgot to mention and worth adding here: There are forks from OpenSWAN that are focused on Authentication (StrongSWAN) and one that was just created (LibreSWAN) right after a lawsuit about ownership was… [read more]

Read More…

Working with Amazon AWS VPC: Software-based VPN Part 1

Are you looking for a custom encryption algorithm, company requirement for your VPN that is not supported on Hardware VPN in VPC? I’ve mostly seen in several networking forums that people don’t set up a Hardware VPN with AWS VPC due to the main reasons below: Preference of using other encryption algorithm than AES-128 (i.e. AES256,… [read more]

Read More…

Working with Amazon AWS EC2: Ephemeral disks

Ever wondered how useful instance storage (ephemeral disk) could be?   As shown in the previously article, we start to see things differently while working with Cloud Computing, therefore apart from the EBS disks we discussed earlier on we will now be focusing in instance storage – well-known as ephemeral disk. Starting from instances ‘m1.small’… [read more]

Read More…

Working with Amazon AWS EC2: Resizing disks

Have you ever thought how easy would be to resize a disk in a Cloud environment? Now, imagine with Amazon AWS… much easier though   Starting a new article series called “Working with Amazon AWS” after thinking a lot if this would be public or private classes maybe, I’ve decided to make it public through… [read more]

Read More…

Troubleshooting SSH connectivity issues

Have you ever got stuck troubleshooting why your SSH connection is dropping, sometimes freezes every time you run some commands like top? Check out this quick article. When working with Cloud environments you find yourself connected with 1 or sometimes 2, 3 VPNs to get a simple shell, and when you are there you may… [read more]

Read More…

MySQL PAM and Active Directory authentication

How-To configure your MySQL to use PAM and/or Active Directory authentication with percona-pam-authentication plugin. Continuing articles about Two-Factor authentication or integrating Linux services with Active Directory, this How-To is one of my recent works that I have done these days, so I hope it may help the community with this guide to configure MySQL with PAM and subsequently using Active… [read more]

Read More…

SFTP Jail (chroot) with Active Directory authentication

Another How-To secure SFTP using chroot with AD authentication restricting by Group. You may find loads of articles how to do a SFTP using SSH as well as a Jail, however only few websites provide a How To authenticate against an existent Active Directory. Moreover, you may find hard using winbind to join your Linux… [read more]

Read More…

Virtual machine images for Virtualbox and VMware

Looking for Virtual machine images for Virtualbox and/or VMware? That quick tip is for you then.   Sometimes you need to build a dev environment or even a quick one for learning purposes. However, you are always in a hurry and can’t spend time installing a new Linux distribution or configuring basic settings in a… [read more]

Read More…

SSH Two-factor authentication

How to improve SSH security using Two-factor authentication.   If you are in a process of implementing ISO 27001, PCI-DSS or any other standardization for security, you definitely asked yourself about SSH Two-factor authentication or SSH Dual authentication as other may say. There are some software that can accomplish that task, but the most famous one these… [read more]

Read More…