Monthly Archive: January, 2010

Intelligent DEfence Activation – IDEA

Be prepare to read the whole post… don’t SKIP lines or words. Normally for securing our machine against hostile machines, we need to check our log files periodically (like /var/log/secure) and then add… Continue reading

Disable mail alert by CRON

Normally, we had seen that after the crontab executes your cron job it sends you a email as a notification on root email. I don’t want the email to be send on root… Continue reading

Managing SWAP in Linux

Here are some fundamental guidelines to manage your SWAP space in LINUX, more efficiently. 1. Try to create SWAP as your first partition on the HDD. HDD works on the concept of ZCAV… Continue reading

How to crack weak passwords using “john-the-ripper”

STEP #1 – Install “John-the-ripper” from the link given below and install using rpm http://dag.wieers.com/rpm/packages/john/ STEP #2 – Use “unshadow” command to combine /etc/passwd and /etc/shadow files, so that john-the-ripper can use it.… Continue reading

Check IPv6 support on Linux

FACT #1 – Number of IP addresses available theoretically. IPv4 – 4,294,967,296 IPv6 – 340,282,366,920,938,463,463,374,607,431,768,211,456 CHECK #1 – Checking IPv6 support on your LINUX machine. cat   /proc/net/if_inet6 this command must shows two up… Continue reading