Link: How to verify DDOS attack with netstat command on Linux Terminal

Your server appearing pretty slow could be many things from wrong configs, scripts and dodgy hardware – but sometimes it could be because someone is flooding your server with traffic known as DoS ( Denial of Service ) or DDoS ( Distributed Denial of Service ).

Denial-of-service attack (DoS attack) or Distributed Denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. This attack generally target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers. DoS attacks are implemented by either forcing the targeted computer to reset, or consuming its resources so that it can no longer provide its services or obstructs the communication media between the users and the victim so that they can no longer communicate adequately.

In this small article you’ll see how to check if your server is under attack from the Linux Terminal with the netstat command

Full article here:
How to verify DDOS attack with netstat command on Linux Terminal (Linuxaria)

Link: How To Setup a VPN in Ubuntu using OpenVPN

We love Linux and we love it for its open source nature, security, and powerful tools. There are a lot of free as well as commercial VPN solutions available for Ubuntu. We are not going to list or rank all the top VPN providers. We don’t necessarily want to rank them simply because users choose their VPN provider based on their personal requirements. If you want an US VPN service, you should look for the best US VPN service that supports OpenVPN. The intent of the article is to help newbies configure and use their favorite VPN service without going back and forth in Ubuntu community forum and embarrass oneself before the rather patronizing users.

Full article here:
How To Setup a VPN in Ubuntu using OpenVPN (Linuxaria)

Link: How to look up the geographic location of an IP address from the command line

If you want to find out where a given IP address is physically located on earth, there are quite a few online GeoIP lookup services you can try (e.g. geoiptool.com). These online services are mostly powered by freely available GeoIP databases such as those from MaxMind. Besides using such web-based services, there are different ways to query the GeoIP databases, notably via the Linux command line.

In this tutorial, I am going to describe how to geolocate an IP address from the command line in Linux.

Full article here:
How to look up the geographic location of an IP address from the command line (Xmodulo)
Related:
Geo IP Lookup API (ProgrammableWeb)

Link: 10 URLs That Every Google User Should Know

Where can you get a list of every ad that you have clicked on Google? Where should you go if you don’t remember your administrator password? What are your interests as determined by Google?

Here are 10 important links that every Google user should know about. They are tucked away, somewhere deep inside your Google dashboard.

Full article here:
10 URLs That Every Google User Should Know (Digital Inspiration)

Link: How to spoof the MAC address of a network interface on Linux

A 48-bit MAC address (e.g., 08:4f:b5:05:56:a0) is a globally unique identifier associated with a physical network interface, which is assigned by a manufacturer of the corresponding network interface card. Higher 24 bits in a MAC address (also known as OUI or “Organizationally Unique Identifier”) uniquely identify the organization which has issued the MAC address, so that there is no conflict among all existing MAC addresses.

While a MAC address is a manufacturer-assigned hardware address, it can actually be modified by a user. This practice is often called “MAC address spoofing.” In this tutorial, I am going to show how to spoof the MAC address of a network interface on Linux.

Full article here:
How to spoof the MAC address of a network interface on Linux (Xmodulo)

Link: Browse Internet as Nobody knows what you are doing, Simple SOCKS Proxy setup under Linux

As you may know ISPs can see those links you visit from your devices while using their service, this thing bother me and many users who knows about this stuff. Simply we can use SOCKS proxy using SSH. This approach is useful to surf web because things will be encrypted and your local administrator or ISP won’t be able to see what you are doing, they just can see encrypted packets are floating. 🙂

Also this method won’t eat much of your bandwidth but a little difference you may notice while testing your bandwidth using speedtest tools.

Full article here:
Browse Internet as Nobody knows what you are doing, Simple SOCKS Proxy setup under Linux (NoobsLab)

Link: OpenVPN on DD-WRT: A Secure Connection To Home Networks

Since the demise of the free LogMeIn service, you might have lost access to your home PC. Fortunately, with the right router, and a little bit of time, you can gain free access to your home machines very easily with OpenVPN. This guide I’ve written for the DSLReports.com community will focus primarily on OpenVPN running on DD-WRT, but should apply almost equally to “TomatoVPN” firmware, or newer Asus routers which include it (I would also recommend checking out “Tomato by Shibby” — as this looks to be some great firmware for those with supported hardware).

Full article here:
OpenVPN on DD-WRT: A Secure Connection To Home Networks | DSLReports, ISP Information (DSLReports.com)

Link: Features, Installation, Usage of Network Security Toolkit (NST) in Linux

There are so many Linux distribution in the world now. From general Linux category until specific purpose of Linux. Today we will see a sneak peak of Network Security Toolkit Linux.

What is Network Security Toolkit (NST) Linux

NST is a Linux distribution based on Fedora Linux. NST provides security toolkit for professionals and network administrator with a comprehensive set of Open Source Network Security Tools. All of the tools in Top 125 Network Security Tools are included inside NST Linux. NST also comes with an advanced Web User Interface (WUI). We can say that NST Control Panel is in a web form. Another important thing is that NST can be used as a network security analysis validation.

Full article here:
Features, Installation, Usage of Network Security Toolkit (NST) in Linux (LinOxide)

Link: How to use sshfs (Secure Shell FileSystem) to Mount Remote Directories Locally

Sshfs is a file system for operating systems that have FUSE (Filesystem in Userspace) implementation. Examples of such operating systems are Linux, Mac OS X and FreeBSD but not limited to these. SSHFS is a great tool as it enable a user to mount remote directories on the local machine securely. The SSH protocol encrypts the connection between the local and remote machine. This makes it difficult for a third party to see the files being exchanged between the two machines on the network.

Full article here:
How to use sshfs (Secure Shell FileSystem) to Mount Remote Directories Locally (LinOxide)
Related:
SSHFS (Secure SHell FileSystem) for Mounting Remote Linux Filesystems (Tecmint)
Mount Remote Filesystems Over SSH Using SSHFS (Unixmen)
SSHFS in Linux (Linux/Vmware Solutions)
Linux Terminal: sshfs, Remote directory over ssh (Linuxaria)

Link: How to Reset the Password on Any Windows Version, Including 8.1, From Linux

If you have a Windows operating system and you find yourself locked out, Linux is there for the rescue with a very handy tool, ntpasswd.

ntpasswd can be described as an “Offline NT Password & Registry Editor” and it’s a tool that can be used to reset the password of any user that has a valid account on a Windows system.

Full article here:
How to Reset the Password on Any Windows Version, Including 8.1, From Linux (Softpedia)
Related:
Resetting Windows administrator password using Linux (Techie News)