Link: Grsync And GAdmin-Rsync: The Graphical Front-end Applications For Rsync Tool

In our previous article about rsync, we have shown you how to install and use rsync. Working in command line mode is better than GUI mode, however it will be bit difficult to newbies and novice users. Today, I will introduce some graphical front-end tools called Grsync and Gadmin-rsync which will help to ease the usage of rsync tool.

Full article here:
Grsync And GAdmin-Rsync: The Graphical Front-end Applications For Rsync Tool (Unixmen)
Previous article on this subject:
Link: Grsync : Graphical rsync backup tool on Ubuntu (12.10 / 13.04 / 13.10) (TechNotes)

Link: Going Beyond the Default Raspberry Pi Configuration

The default configuration for Raspbian on the Raspberry Pi is completely functional and allows you to jump straight in and start using your Pi from the command line or from the desktop. However, it is often desirable to move beyond the defaults.

Full article here:
Going Beyond the Default Raspberry Pi Configuration (Make Tech Easier)

Link: Automate your Computer Power Off with KShutdown

In this article you will learn how to use KShutdown a graphical shut down utility made by Konrad Twardowski. KShutdown comes packaged with several options to help you time several tasks on your Linux box. If you do not like the command line then this is the perfect tool for you. For the command line enthusiast this is the tool for you when you do just want to do a shut down with graphical user interface, and without having to be root.

Full article here:
Automate your Computer Power Off with KShutdown (LinOxide)

Link: Free yourself from the command line with these 10 GUI tools for Linux

When I broach the subject of Linux with some people, their immediate response is, “I don’t want to have to use the command line.” Ten years ago, I would have understood their trepidation. Today, however, that response is no longer valid. Why? The Linux platform has so many outstanding GUI tools, the command line is no longer a necessity (especially for desktop users). In fact, when on a desktop, I rarely need to use the command line.

Here are 10 easy-to-use GUI tools that have replaced commands. Each one does a great job of standing in for the command line — and in many cases, even adds features.

Full article here:
Free yourself from the command line with these 10 GUI tools for Linux (TechRepublic)

Link: How To : Secure Shell (SSH) Password-less Login using SSH-Keygen

Secure Shell, as the name tells, is the open source and most secure and hence, most used protocol that is used to execute command remotely on a Linux host or to transfer files from one Linux host to another within a network using Secure Copy (SCP). Find more details about Secure Shell in our article- Secure Shell in Linux.

In this article, we will see how to setup password-less login between two Linux system to transfer files between them with the same level of security and trust.

Full article here:
How To : Secure Shell (SSH) Password-less Login using SSH-Keygen (Your Own Linux..!)

Link: Debian Linux Home Router with IPv4 and IPv6

I use Debian Wheezy for a home router with an he.net IPv6 tunnel. Here are the configs I have in place for this to work!

Note: This is not a full how-to guide but rather a dump of config files. Hopefully this will be of use to fellow Linux geeks out there. I am using a /24 class B because I do not like to use 192.168.x.x.

Full article here:
Debian Linux Home Router with IPv4 and IPv6

Link: SSH Dictionary Attack Prevention with iptables

…I found it is also ideal to slow down the attack when the infested host started to brute force the SSH authentication. There are many scripts/user-land daemons that perform monitoring and blocking. However in a resource limited VPS, I prefer to use something that has less demand in memory/CPU usage. IPTables recent module provides a kernel level solution with little overhead.

Full article here:
SSH Dictionary Attack Prevention with iptables (HostingFu)

Link: How to verify DDOS attack with netstat command on Linux Terminal

Your server appearing pretty slow could be many things from wrong configs, scripts and dodgy hardware – but sometimes it could be because someone is flooding your server with traffic known as DoS ( Denial of Service ) or DDoS ( Distributed Denial of Service ).

Denial-of-service attack (DoS attack) or Distributed Denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. This attack generally target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers. DoS attacks are implemented by either forcing the targeted computer to reset, or consuming its resources so that it can no longer provide its services or obstructs the communication media between the users and the victim so that they can no longer communicate adequately.

In this small article you’ll see how to check if your server is under attack from the Linux Terminal with the netstat command

Full article here:
How to verify DDOS attack with netstat command on Linux Terminal (Linuxaria)

Link: How to Run Linux Applications On Your Mac

Linux is beloved by many around the world for its simplicity and ultimate customization Because it’s open source (and free!) many Mac users choose to run it as a virtual machine on VMWare, Parallels, or even Virtual Box. However, sometimes you might want to run a Linux-based application without having to jump through too many hoops. Using a SSH tool called X over SSH2, you can graphically load remote Linux apps and use them right on your Mac.

What You’ll Need:

>> Linux computer or virtual machine on a Mac
>> Apple X11 (Download Here)

Full article here:
How to Run Linux Applications On Your Mac (MacLife)