Plugin Name: HTTP TRACE / TRACK Methods Allowed
To turn off track and trace methods globally on the server add the following line:
vim /etc/httpd/conf/httpd.conf
TraceEnable Off
Read More
Category: Linux
Direct ssh access between two unix system/access two unix system without password
if [ -z “$1″ ]; then echo “usage: ssh-uploadkeys user@host” else if [ -e “$HOME/.ssh/id_dsa.pub” ]; then echo “SSH public key found: ~/.ssh/id_dsa.pub” else echo -e ‘\n\n’|ssh-keygen -t dsa -N ” fi cat ~/.ssh/id_dsa.pub| \ ssh $1 ‘cat > tero-authorized_keys && mkdir -p $HOME/.ssh/ && chmod 0700 $HOME /.ssh/ && cat tero-authorized_keys >> .ssh/authorized_keys && chmod 0600 .ssh/authorized_keys && rm tero-authorized_keys && echo “Success, next time you do not need to type password.”||echo “SSH key generation or upload failed.”‘ fi
login banner Linux
To create a banner so that whenever a user logs into a system will see some default text, you can couple of options
1. put the default text into /etc/motd
2. type echo “<the text you want to display>” into /etc/profile
3. type echo “<the text you want to display>” into user home .profile file. Read More
Using /etc/hosts.allow and /etc/hosts.deny to secure Linux
TCP wrapper based access List Rules can be included in the two files
/etc/hosts.allow and
/etc/hosts.deny . Read More