Skip to main content

How to Easy Handle on Linux Network

We see how the ease of handling Linux network. You never know when need to use the command line or when the need to support graphical interface to iptables

Network now has become a need. Whether in the home or corporate environment, the network is one aspect to computing, without a doubt, necessary to perform the work. And with some help, operating system Linux can be a king of the network, both in terms of ease of use and security. However, that does not mean that the user level (and sometimes even users who are experts) do not need some assistance. Following tips will make your Linux network a bit more smoothly.



Take advantage of the file / etc / hosts

File is used to host a static host name and is a quick way to create a network shortcut. One of the first things you must do in the Linux machine is a machine to enter a different file / etc / hosts. Thus, you do not have to type the IP address. Writing on the file format is IP_ADDRESS NICKNAME. For example, if you perform backups on the machine with the IP address 192.19.1.1 enter: 192.168.1.1 backup. Now if you want to connect to the machine, for example by using the secure shell, you can just type ssh-v-l username backup

Keep the Unwanted Users with / etc / hosts.deny

File "host" who is helping hosts.deny file. With this file, you can control access based on client or server name. This is useful in many situations. You can block a domain that is in the blacklist so it will not be able to access your network or you can block that particular user can not access a machine. But however you use it, the format remains the same. Suppose, you want to block domain bad.domain.name. To do so, open the file / etc / hosts.deny (you'll need root permissions or sudo) and add: ALL: bad.domain.name

Use WICD to Handle Wireless Network

Linux has long experience with the major wireless networks. However, it has become the past. With the current distribution, detection wireless card is no longer difficult, The problem now is the encryption. Many of the Linux wireless tools have problems when encryption is used. However, WICD tool can overcome this. Now, connect to a wireless network encryption in WPA or WPA2 with no difficulty. Use WICD to reduce the difficulty you.

Download and Install Interface for iptables

Do not assume that just because using Linux, then you are safe. You still need some security. And the best security on Linux is iptables. The only problem with iptables is rather difficult (especially for new users) fortunately, there is a graphical interface to iptables. One of the best is a firestarter. Interface makes use iptables to be easy, so you do not spend more security because only lazy learning



Identify the Command-Line Tool

Must be admitted that if we use Linux, then a certain time you need to restart the network and does not have access to the GUI. In this case, the command / etc / rc.d / network restart will overcome your problem. Of course, it is not the only tool command-line network. You also need to know tools like dhclient, traceroute, samba, ping, and netstat.

Enter the DNS Server Direct Address

You may have experienced network problems that caused the loss of DNS server address. For that, enter the DNS server address directly to the file / etc / resolve.conf. The format is as follows: nameserver IP_ADDRESS, where IP_ADDRESS is the IP address of your DNS server. You can enter the DNS server as much as possible.

Antivirus Installation

If you run a mail server, and then have an antivirus is a must. While you are running Linux and your mail server 99.99% immune to the virus, it does not mean that the entire client download from the mail server you are also immune. Thus, the administrative tasks you will be much easier if you install antivirus like ClamAV, for example, to your Linux mail server. He will give you security and tranquility that is so your users stay safe.

Know How to configure the IP Address Manually

It is true, there are GUI tools to do this properly and also all the tool works very well. However, as the later you feel if it is long enough to set up operating system, no one has the tool to do the work in the reserve. One of the best backup tools in managing the network is the Linux command ipconfig. In addition to display the network card information, you can use the ipconfig command to configure the network card manually. This is done as follows:

/ sbin / ifconfig eth0 192.168.1.1 netmask 255.255.255.0 broadcast 192.168.1.255



Identify the file / etc / interfaces (Ubuntu) or / etc / sysconfig / network-scripts (Red Hat / Fedora)

This file contains information about the network card. As you can see in the image example, all interfaces in the set up for dhcp. If you are floating, the dhcp is required. However, what if you use the interface only in one location? For that, you can configure a permanent basis.

Does not Forget When set smbpasswd Samba

When the client or phone that comes with Samba as difficulty, it is usually because the username and password they have not been included with smbpasswd. If not done, then the user will not be able to perform authentication with the Samba server. When using smbpasswd to enter a new user, do not forget to use a switch-as follows: smbpasswd-a USERNAME. After pressing [Enter] you will be prompted to enter a user password. Note: you must have access to root (or sudo) to do this.

Comments

Popular posts from this blog

Graphical User Interface in Java (Part 1 From 3)

Frankly, graphics-based applications are always more interesting than the application of command-line based. And the good news, building graphical applications in Java, it is not as difficult as imagined Java is a programming language first released by Sun Microsystems in 1995. Java philosophy of "Write Once, Run Everywhere" make Java become one of the popular programming languages today. According to the official website of Java, Java technology currently used in 4.5 billion devices (more than 800 million PCs, 1.5 billion gadgets, 2.2 billion smart cards) and still did not include use in printers, web-cam, games, car navigation systems, medical devices, etc Know Java If you've heard of Java, but not so deeply in the program, chances are you will be confused with terms such as Java 2 SDK, JDK, Java Applets, Java Script, Java Runtime Engine (JRE), Java SE 6, etc. All of the Java technology, but if you want to learn to develop Java applications on a PC, the Java SE (Standar

Redmi Officially Launches Redmi Watch

  Redmi officially released its initial smartwatch Redmi Watchin China. In terms of style, Redmi Watch looks similar to the Apple Watch. Redmi Watch has a square-shaped design with rounded corners. Redmi Watchcarries a 1.4 inch 2.5 D display with a resolution of 320 x 320 pixels. Its weight is quite light, just 35 grams.Redmi Watch brings water resistance technology with a depth of up to 50 meters. Redmi Watch brings a variety of sports activity discovery features, from running, cycling, swimming, and also much more. Redmi Watchhas numerous innovative features including a heart price detector and also a rest period tracker. All tracking tasks can be kept track of and also accessed through the Mi Fit application. Via this application additionally, users can establish the screen face on Redmi Watch. There are greater than 120 types of front views to select from for free. Redmi Watchcan get in touch with mobile using Bluetooth connection. This wise watch includes NFC assistance

New Autoit: Debug Mode!

The virus is always ranks 10 most popular of the virus, even in the big 3 a few months back. How new variants in action? Follow this following discription Virus-like folder icon with the standard Windows default this is the older players in the world of viruses. Variannya very much, and comes with a variety of sizes. Of the first characteristics that never change is the use of a folder icon with the aim to deceive users. Antivirus others have to recognize that Autoit virus with a lmaut, Sohaned, or YahLover, known as our own Autoit.EE What Is Autoit ? Alleged that the author himself called Nhatquanglan the most likely came from Thailand. But we are not sure whether the new variants also come from the same manufacturer. For those of you who have never know what it is to Autoit. Autoit or full Autoit Script, is also the name of the applications that use automation to create a script, exactly automation, hotkeys, and scripting, as written in the site. In short, the script will be in autoi