Posts

How to Install Specific Version of Package use YUM

Image
Introduction Learn how to install specific versions of packages using YUM on CentOS/ RHEL systems with detailed steps and advanced examples. YUM (Yellowdog Updater, Modified) is a powerful package management tool used in CentOS and RHEL-based systems. While installing the latest version of a package is straightforward, sometimes you might need a specific version. This guide covers the steps to install a specific package version using YUM, from basic to advanced examples. Understanding YUM and RPM YUM is a front-end tool for RPM (Red Hat Package Manager) that manages package installations, updates, and removals. RPM is the underlying package format used by Red Hat-based distributions. Understanding these tools is crucial for efficient package management. What is YUM? YUM simplifies the process of managing RPM packages by resolving dependencies and retrieving package metadata from repositories. It can install, update, and remove packages from your system. What is RPM? RPM is a low-level...

How to resolve Error: rpmdb open failed In CentOS

In this tutorial, How to resolve Error: rpmdb open failed Error In CentOS. I was testing on nginx web server in Centos 7 VM Linode . Unfortunaely, I have install new package with yum command , I got this error message: error: rpmdb: BDB0113 Thread/process 3050/139803232012096 failed: BDB1507 Thread died in Berkeley DB library error: db5 error(-30973) from dbenv->failchk: BDB0087 DB_RUNRECOVERY: Fatal error, run database recovery error: cannot open Packages index using db5 -  (-30973) error: cannot open Packages database in /var/lib/rpm CRITICAL:yum.main: Error: rpmdb open failed It seemes like YUM broke down. I have not run any yum command. Solve problem, just do the following steps.   First backup the rpm database using command as root user: # mv /var/lib/rpm/__db* /tmp Run the following command: # yum clean all # yum update Clean backup # rm -i /tmp/__db* I hope this helps you.

How to Safely Remove old kernels in CentOS, RHEL and Fedora

Image
Introduction Learn how to safely remove old kernels on CentOS , RHEL , and Fedora to free up space and improve system performance. Step-by-step guide with best practices for maintaining your Linux system. As you continue to update and upgrade your Linux system, particularly on distributions like CentOS, RHEL, and Fedora, old kernels can accumulate over time. While these kernels are essential for booting your system, having too many can clutter your boot menu and consume valuable disk space. This guide will walk you through the process of safely removing old kernels from your system without risking stability, ensuring that your Linux machine runs smoothly and efficiently. Why Should You Remove Old Kernels? The Problem with Accumulating Kernels Linux kernels are the core of the operating system, responsible for managing hardware and system processes. Every time you update your system, a new kernel may be installed, but the old ones aren't automatically removed. This can lead to seve...

How to install aide centos

Image
Introduction In this tutorial, we will explore how to install and configure AIDE (Advanced Intrusion Detection Environment) on CentOS. AIDE is a powerful tool designed for monitoring changes to files on the system, helping you detect unauthorized access and modifications.  Ideal for system administrators and security professionals, this guide will provide step-by-step instructions to ensure a successful setup of AIDE on your CentOS system. By the end of this tutorial, you will have a robust intrusion detection system in place, capable of providing detailed reports about the integrity of your files and system security. What does Aide mean AIDE is one of the most popular tools for monitoring the server changes in a LINUX based system.  It call as Advanced Intrusion Detection Environment. Install AIDE on Centos $ sudo yum install aide Check AIDE Version on your system $ sudo aide -v Configure AIDE $ sudo cp /etc/aide.conf /etc/aide.conf_BK Add lines not check /tmp ...

After install setup Fedora 30

Image
In this tutorial, Things to Do After Fresh Installation Fedora 30. Let do it! TO DO 1. Update your Fedora Always keep your system updated to the latest version of packages. $ sudo dnf update 2. Change the hostname $ sudo hostnamectl status # view current hostname $ sudo hostnamectl set-hostname --static "VivoS15" # set up new hostname 3. DNF tweak edit /etc/dnf/dnf.conf file $ sudo cp /etc/dnf/dnf.conf /etc/dnf/dnf.conf_ORIG [huupv@localhost ~]$ cat /etc/dnf/dnf.conf [main] gpgcheck=1 installonly_limit=3 clean_requirements_on_remove=True fastestmirror=true deltarpm=true 4. Install RPM fusion repository $ sudo dnf update --refresh $ sudo dnf install https://download1.rpmfusion.org/free/fedora/rpmfusion-free-release-$(rpm -E %fedora).noarch.rpm $ sudo dnf install https://download1.rpmfusion.org/nonfree/fedora/rpmfusion-nonfree-release-$(rpm -E %fedora).noarch.rpm 5. Player and codecs $ sudo dnf install youtube-dl vlc $ sudo dnf in...

Checks for open/closed ssh ports using nmap command

Image
Introduction Welcome to our detailed guide on how to check for open and closed SSH ports. In today's networked world, maintaining secure server connections is critical. Secure Shell (SSH) is a network protocol that provides administrators with a secure way to access a remote computer.  However, ensuring that your SSH ports are configured correctly is essential to prevent unauthorized access and breaches.  This tutorial will provide you with step-by-step instructions on using various tools to determine the status of SSH ports on your system. Whether you're a seasoned system administrator or a novice user, these skills are fundamental to managing and securing your network connections. In this tutorial, How to checks all ports if they are closed or open and if the current ssh version? Using nmap command. Read man nmap page. First, you need to install nmap . For ubuntu $ sudo apt-get install nmap For centos $ sudo yum install nmap For example, checks for open/closed ports...

How to Set Up Zimbra FOSS Two-Factor Authentication

Image
Introduction Security is a top priority in any system, and email is no exception. Zimbra FOSS offers a robust open-source email solution, and setting up two-factor authentication (2FA) is a crucial step to enhance security. This article will guide you through the process of setting up 2FA on Zimbra Zimbra FOSS in a detailed and easy-to-understand manner, ensuring your email accounts are better protected against potential threats. How to Set Up Two-Factor Authentication on Zimbra FOSS Look like Buy Now The work will consist of the following parts: A patch to the login screen to support entering the 2FA code. PrivacyIDEA and PrivacyIDEA LDAP Proxy docker containers to run and maintain the 2FA toekens on your Zimbra* Zimlet for integrating in the web-ui of Zimbra (SOAP based) with extension on the server (java soap api) Install documentation All released under GNU GPLv2. Conclusion Implementing two-factor authentication on Zimbra FOSS not only helps protect your emai...

Leverage browser caching for Nginx

In this tutorial, How to configure Leverage browser caching for nginx. What does Leverage browser caching mean? Page load times can be significantly improved by asking visitors to save and reuse the files included in your website. Reduces page load times for repeat visitors Particularly effective on websites where users regularly re-visit the same areas of the website Benefit-cost ratio: high Access needed You should add that inside of an existing server block. For example, I will add that inside server block /etc/nginx/sites-enabled/default file. server {     listen       80;     server_name  localhost;     location / {         root   /usr/share/nginx/html;         index  index.html index.htm;     }         location ~* \.(js|css|png|jpg|jpeg|gif|ico)$ { ...

New reverse proxy tool Modlishka

You can Bypass Two-Factor Authentication and Automate Phishing Attacks by New Reverse Proxy Tool call Modlishka. A Polish cybersecurity researcher has released a tool called Modlishka designed for pen testers The tool will help the pentesters, but may also facilitating the APT Groups in phishing Modlishka Feature: Phishing tool that bypasses Gmail 2FA Support for majority of 2FA authentication schemes Support for majority of 2FA authentication schemes (by design). No website templates (just point Modlishka to the target domain - in most cases, it will be handled automatically). Full control of "cross" origin TLS traffic flow from your victims browsers (through custom new techniques). Flexible and easily configurable phishing scenarios through configuration options. Pattern based JavaScript payload injection. Striping website from all encryption and security headers (back to 90's MITM style). User credential harvesting (with context based on URL parameter passe...

Sharing Tips and Tricks with Zimbra

Introduction Mastering tips and tricks while working with Zimbra can help you maximize the platform's email features. This article compiles useful tips and tricks in a PDF format, making it easy for you to access and apply them in your daily work. Let's explore and enhance your productivity with Zimbra through the practical suggestions shared in this article. Zimbra guilde to see how to use? Blog zimbra share Top 15 Tips & Tricks - Happy new year. Sharing Tips and Tricks with Zimbra Download the guide now to see how to (with easy-to-follow steps and video demos): Search in Zimbra Import Into and Export From Zimbra Change Your Zimbra Preferences Change Your Zimbra Theme Set Zimbra Email and SMS (text) Reminders Enable Mandatory Spellcheck Sort Email Enable Two-Factor Authentication (2FA) Create an Appointment with the Mini Calendar Create an Email Alias, Distribution List or Contact Group Launch an Email in a Separate Window Turn on Zimbra’s Activity Stream ...