In this article we will be discussing a few basic commands we could use in our daily server terminal interaction.
Generally Linux commands have the following syntax.
command [options] [arguments]
Each item is separated by space.
>> Options modify a commands behavior.
- Single letter options usually preceded by “ – ”
- Full word options usually preceded by “ — ”
>> Arguments are file names or other data needed by the command.
>> Multiple commands can be separated by “;”
Lets have a check with few of the most commonly used commands below: (more…)
Today many tools are available for performing Server Administration. In this article, lets have a check with few of the top Server Administration tools.
TightVNC is a remote desktop software application and it can be used to connect to another computer and display its live remote desktop. Like other VNC systems, it consists of two parts: the “Server”, which shares the screen of the machine it’s running on, and the “Viewer”, which shows the remote screen received from the server
TightVNC Server is designed to run in two modes:
>> Application mode
>> Service mode
In application mode, the server, just like any other desktop software, can be running only during the current user session and quits on the logout. Each user has his/her personal settings and passwords. (more…)
IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a source IP address, with the purpose of concealing the identity of the sender or impersonating another computing system. Its a phenomena in which attackers changes or replicate a IP packets. In order to dig deep lets understand some basic concepts.
In internet the connection between two computer takes place using TCP/IP protocol. In which data needed to send from one computer to another is broken down into pieces known as packets. These packets are numbered when broken down so that they can reassembled at the end or receiver. Each packets have two parts header and body. Body stores the message part and Header stores the metadata for the packets such as source IP, destination IP, sequence number, TLL etc. These metadatas are used in the destination for the authentication of the connection or to identify the source of the request. These data can be generated or modified by a third person or attackers this is commonly known as IP Spoofing. (more…)
Some scripts/applications require certain scripts be run at a certain time to function properly.
On Windows servers, we can set them up to run at certain times by creating a schedule task (which is similar to how you can run cron jobs on Linux servers).
Creating a Scheduled Task in Plesk:
We can set up Scheduled Tasks in Plesk by doing the following:
The user you are logging in with should have enough permissions to create a scheduled task. Windows Shared customers automatically have permission, and the Admin user for Windows Dedicated Servers automatically have permission. Additional users created by the Admin on a Windows Dedicated Server may or may not have permission to setup scheduled tasks, depending on what permissions you give them. (more…)
SSH tunneling is used to tunnel all of the traffic from your local machine to a remote server that you have an account. SSH allows users to create TCP tunnels to send data over the network. The amazing thing about SSH tunnels is that they are encrypted.
How tunneling works?
This works by allocating a socket to listen to port on the local side, optionally bound to the specified bind_address. Whenever a connection is made to this port, the connection is forwarded over the secure channel, and a connection is made to host port from the remote machine. Port forwardings can also be specified in the configuration file.
There are two ways to create an SSH tunnel: local and remote port forwarding (more…)