Disclaimer Scripts are not run in a sandbox and thus could accidentally or maliciously damage your system or invade your privacy. Never run scripts from third parties unless you trust the authors or h| ITTavern.com
What is a rogue DHCP server # A rogue DHCP server is an unauthorized DHCP server that distributes knowingly or unknowingly wrong or malicious information to clients that send DHCP discover packets wit| ITTavern.com
There a multiple use cases to run a script on login. Configuration, starting services, logging, sending a notification, and so on. I want to show you different ways to do so. Example script The examp| ITTavern.com
There is no trash can for the Linux CLI. rm removes the data permanently, and there is practically no way of recovering deleted files reliably. trash-cli fills this role and lets you 'trash' files and| ITTavern.com
There are various implementations. I am using nmap-ncat on rockOS 8 on both hosts. Netcat's using TCP by default and this test is not limited by disk I/O from what I understood. That said, it is not| ITTavern.com
rsync is a CLI tool that covers various use cases. Transfering data, creating backups or archives, mirroring data sets, integrity checks, and many more. Reference for this article: rsync version 3.2.| ITTavern.com
In this article, I'll use Ubuntu 22.04 (Debian-derivative) and rockyOS 9.2 (RHEL-derivative) as references. If it is not mentioned, commands are the same for both systems. Basics # Cron jobs are sched| ITTavern.com
I want to show you how to get started with Fail2Ban to keep your Linux servers more secure. For this blog post, I've used Ubuntu 22.04 LTS as a reference and will use it to secure my SSH service with| ITTavern.com
This is an updated version from last year. Thank you for the great feedback! This article covers mainly the configuration of the SSH service and only references ways to protect the service on the hos| ITTavern.com