theurbanpenguin -

OpenStack Swift Storage Management from the CLI

OpenStack Swift Storage Management from the CLI

Learn to master Swift Storage in OpenStack now. You will see the hierarchy of accounts, containers and objects. The basic structure and use of the swift command. Although we can use the horizon Wen Dashboard the CLI is convenient for the demos. As we move...

From theurbanpenguin

OpenStack Swift Storage Management from the CLI

OpenStack Swift Storage Management from the CLI

Master OpenStack Swift Storage Services now on the Stein Release of DevStack #Linux #Swift #DevStack...

From theurbanpenguin

Nested KVM Virtual Machines Ubuntu 18 04

Nested KVM Virtual Machines Ubuntu 18 04

So you want to test KVM or you want to test OpenStack. Do you have spare hardware, if the answer is no then nested KVM virtual machines is the answer. Running one KVM machine with support for more inside and we show you how on an Ubuntu 18.04 host Additio...

From theurbanpenguin

Nested KVM Virtual Machines Ubuntu 18 04

Nested KVM Virtual Machines Ubuntu 18 04

Want a Virtual Machine in a Virtual Machine. Want to get started with OpenStack but short on hardware. How to Nest KVM Virtual Machines...

From theurbanpenguin

Using Cloud Images with Ubuntu 18 04 KVM Host

Using Cloud Images with Ubuntu 18 04 KVM Host

We now take a look at how easy we can make virtualisation on our KVM host running on Ubuntu 18.04. We can download prebuilt cloud images and configure those images during the import. It this way, we can set the password for the default user and the hostna...

From theurbanpenguin

Using Cloud Images with Ubuntu 18 04 KVM Host

Using Cloud Images with Ubuntu 18 04 KVM Host

How easy is to create a Virtual Machine in KVM. We show you in a couple of minutes you can have a VM running using cloud images...

From theurbanpenguin

Securing Ubuntu 18 04 with Apparmor

Securing Ubuntu 18 04 with Apparmor

Mandatory Access Control systems like SELinux or Apparmor go way beyond Linux permissions which are discretionary and can be ignored by root. Application on your system such a ping run with the SUID bit as root. We want to limit their access to the system...

From theurbanpenguin

Securing Ubuntu 18 04 with Apparmor

Securing Ubuntu 18 04 with Apparmor

Learning how to secure Ubuntu 18.04 Linux with Apparmor profiles...

From theurbanpenguin

Set QEMU/KVM Guest hostname via DHCP

Set QEMU/KVM Guest hostname via DHCP

In this video we use KVM/QEMU installed on the Ubuntu 18.04 host set set guest IP and Hostnames via DHCP. We can use the virsh command to edit the network configuration on the QEMU/KVM host to reserve IP address and hostname for the gust MAC address. For ...

From theurbanpenguin

Set QEMU/KVM Guest hostname via DHCP

Set QEMU/KVM Guest hostname via DHCP

It is easy to make IP reservations in QEMU/KVM DHCP server. We will show you also how easy it is to set the guest hostname #Linux #Ubuntu #KVM...

From theurbanpenguin

Adding a 7

Adding a 7" Display to the Raspberry Pi 3

The Raspberry Pi is great but by the time you add a starboard desktop display is bulky. The 7" LCD Touch screen display may be the answer you need. Keeping the footprint small and low powered you will need this device. We show how to connect the display w...

From theurbanpenguin

Adding a 7

Adding a 7" Display to the Raspberry Pi 3

Adding the 7" screen to the Raspberry Pi...

From theurbanpenguin

Virtual Drives on the Raspberry Pi using Loopback Devices

Virtual Drives on the Raspberry Pi using Loopback Devices

Adding drives to the Raspberry Pi have never been easier with loopback devices. Create files to use as drives and link them to loopback device files. Easy... Ensure they are linked at system boot by creating a systemd unit file to run losetup. Now your Ra...

From theurbanpenguin

Virtual Drives on the Raspberry Pi using Loopback Devices

Virtual Drives on the Raspberry Pi using Loopback Devices

Virtual Drives on the #RaspberryPi using loopback devices...

From theurbanpenguin

Creating a DEBIAN Package on the Raspberry Pi

Creating a DEBIAN Package on the Raspberry Pi

Learn to create a functioning debian package file for distribution on your Raspberry Pi. Instal the package on any RPi. We take you through a simple C program to creating a MAN page. Finally building the package. Additionally you can find my video courses...

From theurbanpenguin

Creating a DEBIAN Package on the Raspberry Pi

Creating a DEBIAN Package on the Raspberry Pi

Crerating a Debian Package on the #RaspberryPi. From the binary thru to the man page...

From theurbanpenguin

Limit login attempts with pam_tally2 in Ubuntu

Limit login attempts with pam_tally2 in Ubuntu

Limiting user login attempts when an incorrect password is used is an absolute must in securing your system against cybersecurity attacks. If password login is allowed then we can limit the attempts before an account is locked. We use Ubuntu 18.04 and pam...

From theurbanpenguin

Limit login attempts with pam_tally2 in Ubuntu

Limit login attempts with pam_tally2 in Ubuntu

Locking user accounts with failed login attempts using pam_tally2.so in Ubuntu 18.04. Ensuring you limit your #Cybersecurity threat @LPIConnect...

From theurbanpenguin

Searching for rootkits with rkhunter on CentOS 7

Searching for rootkits with rkhunter on CentOS 7

We now dig a little deeper into rootkits and Linux security by installing rkhunter on CentOS 7 and watching how it detects suspicious activity in your efforts in cybersecurity. This ia part of a series getting your ready for the LPIC-3 303 exam in Linux s...

From theurbanpenguin

Searching for rootkits with rkhunter on CentOS 7

Searching for rootkits with rkhunter on CentOS 7

Let's sharpen our #Linux Security skills further by digging deeper into rootkits with rkhunter on CentOS 7. Our #cybersecurity fight with @LPIConnect LPIC-3 certification in mind...

From theurbanpenguin

Ubuntu 18.04 Install of the RootKit Hunter package rkhunter

Ubuntu 18.04 Install of the RootKit Hunter package rkhunter

Ensuring your Linux system is capable of withstanding the latest cybersecurity threats we install the rkhunter rootkit detector on Ubuntu 18.04. Detecting rootkits and vulnerabilities help you to secure your system from threats. Additionally you can find ...

From theurbanpenguin

Ubuntu 18.04 Install of the RootKit Hunter package rkhunter

Ubuntu 18.04 Install of the RootKit Hunter package rkhunter

In this video we look installing and configuring the rootkit hunter package, rkhunter on Ubuntu 18.04. Getting you ready for the LPIC-3 Linux Security Exam from @LPIConnect...

From theurbanpenguin

Linux Security Using AIDE on Ubuntu 18.04

Linux Security Using AIDE on Ubuntu 18.04

You can find many videos or blogs on installing aide. However, most leave you with the default configuration which may not be the most useful to you. In this video we do show the default configuration and the issues you may have with it. We them move on t...

From theurbanpenguin

Linux Security Using AIDE on Ubuntu 18.04

Linux Security Using AIDE on Ubuntu 18.04

Learn how to install and configure AIDE in Ubuntu 18.04 so you can target just the directories that you need to protect from rootkits and Intruders. #Linux Security @LPIConnect...

From theurbanpenguin

Understanding Linux Sockets and the LDAPI Interface

Understanding Linux Sockets and the LDAPI Interface

LDAPI allows you to connect using a Linux Socket to the OPenLDAP Server. But what is a socket and how can we use them. In this video we look at the file type: socket. How to list them and how we can connect to services on the local system. Additionally y...

From theurbanpenguin

Understanding Linux Sockets and the LDAPI Interface

Understanding Linux Sockets and the LDAPI Interface

Let's take a look at discovering #Linux Sockets, how they are used and how to list them. We use this in conjunction with OpenLDAP and the LDAPI interface...

From theurbanpenguin

Linux Security: Auditing Ubuntu 18.04

Linux Security: Auditing Ubuntu 18.04

Ubuntu does not ship with the Linux Audit System by default. This can lead to issues being able o track who did what. If you have multiple administrators on a Ubuntu system if they use su - or sudo -i to gain an administrative shell, without the Linux Aud...

From theurbanpenguin

Linux Security: Auditing Ubuntu 18.04

Linux Security: Auditing Ubuntu 18.04

Adding the #Linux Audit System to #Ubuntu 18.04 allows you to track which administrator did what task, even if they use su or sudo -i. Essential learning for @LPIConnect LPIC-3 303...

From theurbanpenguin

Have Linux calculate all your video durations

Have Linux calculate all your video durations

Why do we need a GUI when the Linux command line is all we need to run simple calculations like the total duration of all your videos. With a simple loop we can run through each video to collect the duration and add them all together taking just seconds. ...

From theurbanpenguin

Have Linux calculate all your video durations

Have Linux calculate all your video durations

When submitting video courses, it is important I have the total duration of all my videos. The #Linux command line makes this easy...

From theurbanpenguin

Master Regular Expressions Using sed

Master Regular Expressions Using sed

In this video you will learn how you can quickly remove clutter from your configuration files so you can easily see what to focus upon. Using a practical example of removing comments and blank lines from an Apache configuration you will see how we can qui...

From theurbanpenguin

Master Regular Expressions Using sed

Master Regular Expressions Using sed

Declutter your configuration files by mastering sed at the #Linux command line #WednesdayWisdom...

From theurbanpenguin

The Urban Penguin

The Urban Penguin

A quick intro to the urban penguin and what you will find to help you learn Linux Additionally you can find my video courses on Pluralsight: http://pluralsight.com/training/Authors/Details/andrew-mallett and take time to see my own site http://www.theurb...

From theurbanpenguin

The Urban Penguin

The Urban Penguin

Welcome to our YouTube channel helping you learn #Linux...

From theurbanpenguin

User Input BASH Script

User Input BASH Script

Learn how to capture user input from a BASH shell script using the internal read command in BASH Additionally you can find my video courses on Pluralsight: http://pluralsight.com/training/Authors/Details/andrew-mallett and take time to see my own site ht...

From theurbanpenguin

User Input BASH Script

User Input BASH Script

Read User Input from #Bash Shell Script...

From theurbanpenguin

Using RPM to Detect Intruders

Using RPM to Detect Intruders

Before we delve into AIDE let's see what we can do with standard tools in Linux. Using rpm in Red Hat based systems we can query for files that don't match their template state. This could be nothing more than an edited configuration or it may me more sig...

From theurbanpenguin

Using RPM to Detect Intruders

Using RPM to Detect Intruders

Installing packages with YUM or RPM ensures we know the state of each file that we should have. Using RPM we can find files that have been edited. #Linux Security...

From theurbanpenguin

Regenerating Linux Shadow Data with pwunconv

Regenerating Linux Shadow Data with pwunconv

Ever wondered what the point of the pwunconv command is. Why would you want your secure Linux passwords in an insecure file. Well if you edit the login.defs file and you want to apply new settings to all accounts. Use pwunconv and then pwconc. Additiona...

From theurbanpenguin

Regenerating Linux Shadow Data with pwunconv

Regenerating Linux Shadow Data with pwunconv

If you have ever wondered why you would ever use the pwunconv command, your answer is in this video. Regenerating shadow data for all users after a login.defs change. Simple and effective #Linux security...

From theurbanpenguin

LPIC-3 303 Configuring Audit Rules in CentOS 7

LPIC-3 303 Configuring Audit Rules in CentOS 7

We can now take a little time to look at how you can create your own custom audit rules within the Linux Audit system. We will audit permission changes on the /etc/shadow file and pick up those changes with ausearch from the audit log. This is preparing ...

From theurbanpenguin

LPIC-3 303 Configuring Audit Rules in CentOS 7

LPIC-3 303 Configuring Audit Rules in CentOS 7

OK, let's get to grips with the LPIC-3 #Linux Security exam and dive into creating custom audit rules with auditctl...

From theurbanpenguin

Read Linux File Permissions : Symbols, Octal and Raw

Read Linux File Permissions : Symbols, Octal and Raw

I don't doubt that you know how to use ls -l to list a file mode or permissions in Linux. This will show the symbolic mode of the file but we also have the octal mode but what about the raw mode. We will show you how to see all three modes with the stat c...

From theurbanpenguin

Read Linux File Permissions : Symbols, Octal and Raw

Read Linux File Permissions : Symbols, Octal and Raw

OK so I am sure that you can read Linux file permissions with ls -l. But what about the raw mode with stat?...

From theurbanpenguin

LPIC-3 Understanding the Audit Deamon Configuration and Restarts

LPIC-3 Understanding the Audit Deamon Configuration and Restarts

If you need to secure Linux then you will need to audit Linux security events. This is done via the AUDITD in Enterprise Linux 7. In this video we take a look at the configuration of the auditd.conf and how to restart the service after configuration chang...

From theurbanpenguin

LPIC-3 Understanding the Audit Deamon Configuration and Restarts

LPIC-3 Understanding the Audit Deamon Configuration and Restarts

You will probably want to, if not need to audit security events in Linux. The is is where auditd comes in and we look at the configuration for LPIC-3 303...

From theurbanpenguin

Making use of POSIX Capabilities in Linux to Reduce the Need to root Permissions

Making use of POSIX Capabilities in Linux to Reduce the Need to root Permissions

Being able to reduce the programs the rely on full root privileges on your system will enhance your security. Of, course you still need those programs to be usable and this is where POSIX Capabilities come to play. Capabilities break the administrative ri...

From theurbanpenguin

Making use of POSIX Capabilities in Linux to Reduce the Need to root Permissions

Making use of POSIX Capabilities in Linux to Reduce the Need to root Permissions

Using POSIX Capabilities can reduce your requirement for full root permissions, assigning just what is required. LPIC-3 303 #Linux Security...

From theurbanpenguin

Latest Searched Keywords

how to fix a electric socket , how to repair a stripped spark plug socket , how to repair electric socket , how do you fix a plug socket , how to fix plaster around plug sockets , how to change country ipad itunes , how to change country ipad 2 , how to change your ipad country , how to change ipad to different country , how to change netflix country ipad , how to change google country ipad , how to change ipad to another country , how to change store country ipad , how to change shared drive password , how to change shared drive letter , how to add primary key constraint in sql server 2008 , how to add primary key constraint in sql server 2008 r2 , how to add primary key constraint to an existing table in sql server 2008 , drop primary key constraint in sql server 2008 r2 , add composite primary key constraint in sql server 2008 , how to add constraint in sql server 2005 , how to add constraint in sql server 2005 as foreign key , how to add unique constraint in sql server 2005 , how to add default constraint in sql server 2005 , how to add check constraint in sql server 2005 , how to add not null constraint in sql server 2005 , how to add primary key constraint in sql server 2005 , how to add unique key constraint in sql server 2005 , how to add constraint to existing table in sql server 2005 , how to change itunes account without credit card

About Us

  • Privacy Policy
  • DMCA
  • Contact
© 2017 Howtodosite.com - Sitemap - csitemap - chsitemap