Home Blog Page 32

Configure Syslog on Solaris 11.4 for Remote Logging

0
This guide presents a simple way of how to configure Syslog on Solaris 11.4 send logs to remote syslog server. In our previous guide, we discussed how to configure remote logging with rsyslog on Ubuntu 18.04. Configure Syslog on Solaris 11.4 for Remote Logging Before you can proceed to configure syslog on Solaris 11.4, first check if it is enabled. svcs system-log STATE...

Installing Linux Dash with Nginx on Ubuntu 18.04 LTS

0
This guides presents a simple way installing Linux Dash with Nginx on Ubuntu 18.04 LTS. Linux Dash is an opensource web based monitoring dashboard for Linux systems. It displays system metrics and properties such as number of running processes, number of logged in users, the CPU load, memory statistic, disk usage, network connections, internet connection speed etc. You can...

How to Install Programs from Source on Ubuntu 18.04

0
In this guide, we are going to learn how to install programs from source on Ubuntu 18.04. More often than not, the easiest and hustle free method of installing programs on Ubuntu 18.04 or the whole Linux family is to use the respective distribution package manager. This ensures that you are installing a software that is optimized for your...

Configure IPSEC VPN using StrongSwan on Ubuntu 18.04

4
In this guide, we are going to learn how to configure IPSEC VPN using StrongSwan on Ubuntu 18.04. We covered similar guides on how to install OpenVPN server on Fedora 29 and FreeBSD 12. You can check that by following the links below; Install and Configure OpenVPN Server FreeBSD 12 Install and Setup OpenVPN Server on Fedora 29/CentOS 7 Well,...

Install and Setup Suricata on Ubuntu 18.04

1
Today, we are going to learn how to install and setup Suricata on Ubuntu 18.04. Suricata is an opensource network threat detection tool. Suricata uses rules and signatures to detect threat in network traffic. It also supports Lua scripting language that helps it unearth the most complex would be threats in the network. Suricata is a product of Open...

How to Install and Setup GRR clients on Ubuntu 18.04/Debian 9

0
Welcome to our guide on how to install and setup GRR clients on Ubuntu 18.04/Debian 9 servers. Before you can deploy GRR agents, you need to have a running GRR server. We did a tutorial covering installation of GRR server on Ubuntu 18.04 in our previous guide. Once you have the GRR server ready, proceed as follows; Install and Setup...

Install GRR Incident Response Framework on Ubuntu 18.04

0
Hello folks. Today we are going to learn how to install GRR incident response framework on Ubuntu 18.04. Google Rapid Response (GRR) is a python based incident response framework that focuses on live forensics and investigations. It enables security analysts to examine and attacks and perform analysis remotely. GRR is deployed in a server-client architecture. The GRR server provides a...

Install Metasploit Framework on Fedora 29

0
Welcome to our guide on how to install Metasploit Framework on Fedora 29. Metasploit Framework is the opensource community version of the most popular penetration testing and system security assesement software platform, Metasploit. We covered the installation of the Metasploit combined version on Ubuntu 18.04 in our previous guide. Install Metasploit Framework on Fedora 29 The release of nightly build version...

Installing Metasploit on Ubuntu 18.04 LTS

1
This guide is about how installing Metasploit on Ubuntu 18.04 LTS. Metasploit Framework provides a platform and tools for performing deep system security auditing as well as penetration testing to unearth, exploit and validate every other would-be vulnerability. Metasploit is available in both the commercial and opensource version (thanks to Rapid 7 for teaming up with OSS community). We...

Install and Configure AIDE on Ubuntu 18.04

2
Welcome to our guide on how to install and configure AIDE on Ubuntu 18.04. AIDE is an acronym for Advanced Intrusion Detection Environment. It is a free replacement of the popular Tripwire. It is an host-based intrusion detection system used to specifically monitor file integrity to detect any possible unauthorized changes. AIDE, when it runs for the first time,...