Link: Systemback: Restore Your Linux System To Previous State

A couple of months ago, we have described an awesome tool called TimeShift that can be used to restore your Linux desktop to the previous working state in Unixmen. In the same series, today I introduce a new tool named systemback.

Systemback is an open source, system backup and restore application. Using Systemback, we can easily create backups of system and users configuration files. In case of problems, we can easily restore the previous state of the system. There are extra features like system copying, system installation and Live system creation.

Full article here:
Systemback: Restore Your Linux System To Previous State (Unixmen)

Link: 6 quick tools to monitor system resources on Linux

System administrators need to monitor their server to ensure proper functioning. The practice enables administrators to detect possible issues in advance and recover the system, before it causes any trouble.

There are plenty of commands on Linux to monitor different system resources like cpu usage, memory usage, network, disk usage and so on. Popular ones are top, htop, iostat, nethogs etc.

In this post we are talking about simple command line tools that can monitor multiple system resources like cpu, memory, network, disk, processes etc all together in a real-time and interactive manner. These tools present a whole lot of statistical information on a single screen that is constantly updated.

Full article here:
6 quick tools to monitor system resources on Linux (BinaryTides)

Link: 8 Cool Ways To Use SCP

The SCP protocol is a network protocol, based on the BSD RCP protocol, which supports file transfers between hosts on a network. SCP uses Secure Shell (SSH) for data transfer and utilizes the same mechanisms for authentication, thereby ensuring the authenticity and confidentiality of the data in transit. A client can send (upload) files to a server, optionally including their basic attributes (permissions, timestamps). Clients can also request files or directories from a server (download). SCP runs over TCP port 22 by default. Like RCP, there is no RFC that defines the specifics of the protocol.

SCP is an awesome tool. Learn it, Love it, Use it….

Full article here:
8 Cool Ways To Use SCP (UrFix’s Blog)

Link: 18 Examples to Learn Iptable Rules On CentOS

Iptable is the administration tool for IPv4 packet filtering and NAT. Iptables is used to set up, maintain, and inspect the tables of IPv4 packet filter rules in the Linux kernel. Several different tables may be defined.Each table contains a number of built-in chains and may also contain user-defined chains.Each chain is a list of rules which can match a set of packets. Each rule specifies what to do with a packet that matches. This is called a `target’,which may be a jump to a user-defined chain in the same table.

Full article here:
18 Examples to Learn Iptable Rules On CentOS (LinOxide)

Link: How to install Monit monitoring and CSF firewall for your linux vps server

Monit and Config Server Firewall (CSF) are both simple and easy to use software for linux vps servers.
Monit not only sends you, email and jabber alerts but also provides you with a web interface from which you can store and graphically represent your data.

Full article here:
How to install Monit monitoring and CSF firewall for your linux vps server (Techarena51)

Link: OS X: Roll Your Own Malware Detection

Macs are not immune to malware.  Authors of malicious software often try to get a LaunchDaemon or LaunchAgent installed onto your computer [in any of several system folders]…

OS X has a lesser-known feature called Folder Actions.  These allow you to run scripts when an item is added to a folder.  You can set up a simple script that lets you know when an item is added to one of the folders above and then open it to see what was added.  If it is not something you recognize or were expecting, delete it.

Full article here:
OS X: Roll-your-own Malware Detection (Jacob Salmela)

NOTE: The instructions in this article are slightly out of the correct sequence for OS X 10.9 Mavericks, but if you follow them as shown you will see the problem. The main thing is, after right-clicking the folder you wish to monitor, and then selecting Services and Folder Actions Setup, on the first screen that appears select add – new item alert.scpt as shown below:

Choose script to attach

Then on the next screen, just make sure all the boxes are checked, especially the first one “Enable Folder Actions” as shown below:

Adding new item alert folder action

Link: Going Beyond the Default Raspberry Pi Configuration

The default configuration for Raspbian on the Raspberry Pi is completely functional and allows you to jump straight in and start using your Pi from the command line or from the desktop. However, it is often desirable to move beyond the defaults.

Full article here:
Going Beyond the Default Raspberry Pi Configuration (Make Tech Easier)

Link: How To : Secure Shell (SSH) Password-less Login using SSH-Keygen

Secure Shell, as the name tells, is the open source and most secure and hence, most used protocol that is used to execute command remotely on a Linux host or to transfer files from one Linux host to another within a network using Secure Copy (SCP). Find more details about Secure Shell in our article- Secure Shell in Linux.

In this article, we will see how to setup password-less login between two Linux system to transfer files between them with the same level of security and trust.

Full article here:
How To : Secure Shell (SSH) Password-less Login using SSH-Keygen (Your Own Linux..!)

Link: SSH Dictionary Attack Prevention with iptables

…I found it is also ideal to slow down the attack when the infested host started to brute force the SSH authentication. There are many scripts/user-land daemons that perform monitoring and blocking. However in a resource limited VPS, I prefer to use something that has less demand in memory/CPU usage. IPTables recent module provides a kernel level solution with little overhead.

Full article here:
SSH Dictionary Attack Prevention with iptables (HostingFu)