Tag Archives: Administration

Effectively remove a user from the system

This is a very interesting article that describes in detail all the required actions a sysadmin should perform in order to effectively remove a user from a Linux system. This checklist mainly focuses on security, covering all aspects of the removal procedure, from the user’s documents to mail aliases, cronjobs, user’s processes etc. Read the…

Continue reading

Setting up Subversion and WebSVN

I always wanted to learn how to set up a version control system, especially SVN since everybody tend to move to that system. This howto will illustrate a way to install and configure Subversion and websvn on a Debian server with the following features: multiple repository Subversion access to the repositories via WebDAV (https, https)…

Continue reading

ModSecurity Overview

ModSecurity is an Apache module which adds an extra layer of security by analyzing client requests before they are processed by Apache and, furthermore, by analyzing server responses after a request has been processed. This article intends to be a ModSecurity overview and to provide the reader with the basic knowledge about the most important…

Continue reading

Local YUM Repository


Sometimes, especially when you create your own RPMs, it is extremely useful to keep them in a local YUM repository. The advantage of this is that, when you install a package, YUM automatically resolves any dependencies, not only by downloading the necessary packages from the other repositories you might have in you list, but also…

Continue reading

Be your own Certificate Authority (CA)


This article describes how to become your own Certificate Authority (CA) and issue your own server certificates. Be advised that noone else, apart from you, your internal network’s people or your friends, will or should trust this kind of certificates (self-signed). These are intended only for providing secure communication with your own services or for testing purposes.

Set up the VNC Server in Fedora


This article describes in brief how to configure VNC server instances for one or multiple users on a remote machine, how to use VNC to start graphical applications on boot and finally how to enhance security by connecting to the server through encrypted SSH tunnels.

User management from the command line

This is a short article about the most common practices in user and group management from the command line. The information is specific to Fedora Core and Red Hat based distros, but would do for any distribution probably with slight differences in the command options.