Virtono Community Blog

0

Restrict executable SSH commands with authorized keys

The OpenSSH Secure Shell Server provides secure, encrypted remote access to Linux and Unix systems. The server side is the file authozired_keys in .ssh a user’s primary folder to configure a public-key authentication . Normally, a user gets full access to the system where the authentication...

0

Compiling Linux kernels under Ubuntu or Debian

Compiling a Linux kernel is not an everyday occurrence for most administrators. It is all the more important to know the right tools when the time comes. The following article shows examples of how Mainline / Vanilla Kernel and the...

0

Install Oracle Java JRE on Ubuntu

This article shows how to manually install Oracle’s Java Runtime Environment (JRE) on Ubuntu. By 2011, Oracle JRE was included directly in Ubuntu and Debian. For licensing reasons, however, these packages were removed there. Manually install JRE The following...

0

Programming an x86 processor like an Arduino

The Arduino -Online IDE support with Intel’s help in the future x86-based Linux Computers including migration path to professional IDEs. A fully configured hardware kit is designed to make it easier for embedded developers to get started. Arduino Create ,...

0

Collect system statistics under Ubuntu with serverstats

For the analysis of operating system statistics, there are numerous possibilities, but for a rough analysis, it is sufficient in many cases to take the most important components under the microscope. The rrd-using tool serverstats provides quick and easy access to...

0

Create your own apt repository with reprepro on Ubuntu

With reprepro simple own package repositories can be created and managed. The tool is located in the Ubuntu repositories and can be used to provide your own packages or to mirror existing repositories. This article introduces reprepro and shows the structure of...

0

Samba server security

This article gives an overview of the possibilities of some security settings of a Samba server. With regard to security, of course, there are always different options, some of which lead to the same goal. This article shows those configuration...