Linux

How to Install and Configure Linux NTP Server and Client

by Karthikeyan Sadhasivam on June 25, 2014

NTP stands for Network Time Protocol.

It is used to synchronize the time on your Linux system with a centralized NTP server.

A local NTP server on the network can be synchronized with an external timing source to keep all the servers in your organization in-sync with an accurate time.
(more…)

How to Setup Linux Etherchannel Bonding for Network Interface HA

by Karthikeyan Sadhasivam on June 17, 2014

In Linux, using etherchannel bonding you can combine two or more physical network interfaces (NIC) together to create a virtual interface.

The IP address will be configured on this virtual interface. If one of the underlying physical adapters goes down, then the other physical adapter is used to handle the communication traffic.

The following are different types of etherchannel bonding modes:
(more…)

We have ntbackup in Windows where we can take the “system state backup” for backing up the domain controller.

This tutorial explains how we can backup the Samba configuration, after you’ve setup Samba as active directory domain controller in Linux.

First, we need to understand what files and folders we are going to backup, and what tools we need to scheduled samba backup.

For Samba, we need to backup two database called as LDB and TDB. We are also looking at backing up the configuration files and sysvol .
(more…)

Readline also provides you with the ability to map your own custom keybindings by editing the .inputrc configuration file in your home directory.

The following are two types of custom keybindings you can define:

  1. Macros
  2. Functions

(more…)

How to Install Kerberos 5 KDC Server on Linux for Authentication

by Karthikeyan Sadhasivam on May 28, 2014

Kerberos is a network authentication protocol.

Kerberos provides a strong cryptographic authentication against the devices which lets the client & servers to communicate in a more secured manner. It is designed to address network security problems.

When firewalls acts a solution to address the intrusion from the external networks, Kerberos usually used to address the intrusion and other security problems within the network.
(more…)

This tutorial explains few practical and useful scenarios in using the tshark command.

You’ll understand how to auto-save captures to multiple files, auto-save captures based on time limits, specify your own buffer size for capture, extract specific fields from the capture, and display statistics for a specific protocol from a capture.
(more…)

A keybinding is simply the mapping of a specific key combination to an action.

Keybindings that we are all familiar with outside of the command line environment are things like:

  • Control-c: copies selected text
  • Control-v: pastes copied text

In this tutorial, we’ll take a look at some of the default keybindings provided in the command line environment (and also where to look if you forget one).
(more…)

Wireshark is an open-source packet analyser used for network analysis.

It can capture, dissect, and decode various protocols.

In this tutorial we will discuss couple of problematic scenarios and how to use wireshark command line tools to analyse the packet.
(more…)