How to use redirects and pipes in Linux
- Details
- Written by d31373
A large part of the power and flexibility of Linux/UNIX-like Operating Systems comes from the design of it's commands and programs. Programs are usually designed to operate efficiently by performing a single function. Programs can be generated by combining multiple basic commands. One command operates to produce data that is used to run the next set of commands.
This guide explains the basic difference between the different types of data streams with which a command line operator may come into contact.
Data Streams
There are three main types of streams used or produced by programs in UNIX-Like Operating Systems. There are nonstandard input and nonstandard output, but we will not be discussing those types of data streams.
How to enable IP Forwarding in Linux
- Details
- Written by d31373
Most Linux desktops and servers have no reason for enabling IP Forwarding. Typically we would only want to enable this setting on servers that act as VPN server, Proxies, or load balancers. There are a few reasons for enabling this setting on desktops. For instance you may be required to enable this setting to do penetration testing.
Regardless of your reasons, this guide will help to identify the files that need to be edited and commands that need to be run in order to enable IPv4 Forwarding. Although IPv6 existing, IPv4 is still the most common version to be enabled and this guide will therefore focus on IPv4 Forwarding.
How to SSH login without passwords
- Details
- Written by d31373
SSH is the typical manner most Linux/UNIX administrators use to remotely access and run commands against a Linux/UNIX server or desktop. Occasionally typing a username and password becomes tedious. Having to type your username and password can put a halt to automating processes.
This guide will help in automating SSH login without a password from a Linux/UNIX system to another Linux/UNIX system.
How to add and remove user accounts in Linux
- Details
- Written by d31373
Creating user accounts on Linux can be easy. If you run Linux as a Desktop there are likely a few GUI tools to add and modify User Accounts. Unfortunately, since most Linux Servers run without GUIs, you must know the commands and how to use them to create and remove users.
This guide will present two options for user account creation and two options for removing user accounts.
How to setup VLANs on Debian-based Linux
- Details
- Written by d31373
Occasionally it is necessary to segment networks into VLANs (Virtual LAN). VLANs are a layer 2 technology which allow for segregation of broadcast domains. VLANs help to logically separate different types of traffic. Segmenting network traffic into data, VoIP, and/or Video Streams can help to provide better manageability and security. VLANs are typically applied at a network switch port by specifying the exact VLAN data and Voice traffic can use, but can also be specified at a Linux virtual port adapter and the network switch can enable 802.1q trunking.
This guide will help in setting up VLANs through editing of Linux configuration files.
Page 2 of 3