Link: 8 Cool Ways To Use SCP

The SCP protocol is a network protocol, based on the BSD RCP protocol, which supports file transfers between hosts on a network. SCP uses Secure Shell (SSH) for data transfer and utilizes the same mechanisms for authentication, thereby ensuring the authenticity and confidentiality of the data in transit. A client can send (upload) files to a server, optionally including their basic attributes (permissions, timestamps). Clients can also request files or directories from a server (download). SCP runs over TCP port 22 by default. Like RCP, there is no RFC that defines the specifics of the protocol.

SCP is an awesome tool. Learn it, Love it, Use it….

Full article here:
8 Cool Ways To Use SCP (UrFix’s Blog)

Links: Setup DHCP Server On CentOS 6.5 or Ubuntu 14.04 LTS Server

DHCP Server is used to distribute IP addresses to the clients in your network. DHCP stands for Dynamic Host Configuration Protocol. It reduces the work burden to a system admin if he/she have to assign IP addresses manually to more than 100+ systems.

Full articles here:
Setup DHCP Server On CentOS 6.5 (Unixmen)
Setup DHCP Server On Ubuntu 14.04 LTS Server (Unixmen)

Link: Mikogo: A Multi-platform Desktop Screen Sharing And Remote Access Software

Most of you have heard and used the LogMeIn service which is used to access a remote system screen via Internet or through native applications. We can use Logmein software to online meetings, remote IT supports, web conferences etc. Unfortunately, Logmein is now switched to paid version and the free service is no longer available. …..

Luckily, we have another application called Mikogo which will help us to access the Desktop and Mobile screens remotely via web and manage them from anywhere. Mikogo is a free for personal use and works well on almost all modern operating systems such as GNU Linux, Windows, Mac OS X, Android, and Web. It is very simple to use, you don’t need to be an expert at all to use it. All you need is a decent uninterrupted Internet connection on both side. Mikogo has intuitive and decent interface to work with, and offers similar features present in Logmein.

Full article here:
Mikogo: A Multi-platform Desktop Screen Sharing And Remote Access Software (Unixmen)

Link: How to set up Internet connection sharing with iptables on Linux

In this tutorial, I’ll explain how to share a single Internet connection among multiple devices on Linux. While consumer-grade WiFi routers have become mainstream nowadays, making this problem a non-issue, suppose you don’t have one at home. However, say you have a Linux box already assembled with a modem and a LAN card. The modem is connected to the Internet with a dynamic public IP address, and the LAN card connected to your switch/hub. Other devices (Linux/Windows PC, laptop) are connected to the switch without having any Internet connection. To share the Internet connection of the Linux box, you have to turn the box into a gateway, so that it can relay traffic to and from other devices.

Full article here:
How to set up Internet connection sharing with iptables on Linux (Xmodulo)

Link: Repair a Broken Ethernet Plug

The locking tab of RJ45 plugs breaks very easily. Replace it by two nylon cable ties (aka zip ties), in minutes.

IMPORTANT NOTES:
– This must be regarded as a temporary “Mac Gyver” solution, for home usage.
– Definitely not for IT staff! (no crimper? asking for one in the budget won’t get you fired!)
– Before the tab breaks, consider protecting the plug.

Full article here:
Repair a Broken Ethernet Plug (Instructables)

Link: How To : Secure Shell (SSH) Password-less Login using SSH-Keygen

Secure Shell, as the name tells, is the open source and most secure and hence, most used protocol that is used to execute command remotely on a Linux host or to transfer files from one Linux host to another within a network using Secure Copy (SCP). Find more details about Secure Shell in our article- Secure Shell in Linux.

In this article, we will see how to setup password-less login between two Linux system to transfer files between them with the same level of security and trust.

Full article here:
How To : Secure Shell (SSH) Password-less Login using SSH-Keygen (Your Own Linux..!)

Link: Debian Linux Home Router with IPv4 and IPv6

I use Debian Wheezy for a home router with an he.net IPv6 tunnel. Here are the configs I have in place for this to work!

Note: This is not a full how-to guide but rather a dump of config files. Hopefully this will be of use to fellow Linux geeks out there. I am using a /24 class B because I do not like to use 192.168.x.x.

Full article here:
Debian Linux Home Router with IPv4 and IPv6

Link: How to verify DDOS attack with netstat command on Linux Terminal

Your server appearing pretty slow could be many things from wrong configs, scripts and dodgy hardware – but sometimes it could be because someone is flooding your server with traffic known as DoS ( Denial of Service ) or DDoS ( Distributed Denial of Service ).

Denial-of-service attack (DoS attack) or Distributed Denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. This attack generally target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers. DoS attacks are implemented by either forcing the targeted computer to reset, or consuming its resources so that it can no longer provide its services or obstructs the communication media between the users and the victim so that they can no longer communicate adequately.

In this small article you’ll see how to check if your server is under attack from the Linux Terminal with the netstat command

Full article here:
How to verify DDOS attack with netstat command on Linux Terminal (Linuxaria)

Link: SSH Kung Fu

OpenSSH is an incredible tool. Though primarily relied upon as a secure alternative to plaintext remote tools like telnet or rsh, OpenSSH (hereafter referred to as plain old ssh) has become a swiss army knife of functionality for far more than just remote logins.

I rely on ssh every day for multiple purposes and feel the need to share the love for this excellent tool. What follows is a list for some of my use cases that leverage the power of ssh.

Full article here:
SSH Kung fu (Tyblog)
Related:
Generate Elliptic Curve (ECDSA) SSH Keys (scottlinux.com)