Virtono Community Blog

0

Network configuration in Debian

This article gives an overview of how the network configuration in Debian can be stored and modified in the configuration file / etc / network / interfaces . Automatic activation at startup In order for certain interfaces to be activated automatically...

0

Analysis of rdiff-backup statistics

Data backups under Linux are easily and efficiently created with rdiff-backup . The tool written in Python also creates statistics for each backup pass and stores them in their own files. The following article explains what the values of the statistics mean and what values you must...

0

Installing Synology Assistant on Ubuntu

This article shows how to install Synology Assistant on Ubuntu . The Synology Assistant is a small tool to disk or RackStations to locate the local network. It facilitates the commissioning of a new NAS and connects after entering the user information to the...

0

Unlock full-encrypted system via SSH

A complete encryption of your own system is an excellent way to ensure the confidentiality of your own data. The current Ubuntu installer offers a guided installation to encrypt the entire system with ” encrypted LVMs “. For...

0

Restrict executable SSH commands with authorized keys

The OpenSSH Secure Shell Server provides secure, encrypted remote access to Linux and Unix systems. The server side is the file authozired_keys in .ssh a user’s primary folder to configure a public-key authentication . Normally, a user gets full access to the system where the authentication...