Advanced Search
Search Results
134 total results found
Firefly 3
Firefly 3 is a self hosted finance tracking application.
Planka
Planka is a self hosted 'to-do-list' application.
Authelia
Authelia is a 2FA application that I use for protecting access to my web apps.
ARP
show arp cache arp -a
User and Database Management
Command syntax will vary between MySQL Versions ==================================================================================== User Management Show all users and hosts SELECT user, host FROM mysql. user; Add User CREATE USER 'name'@'localhost' IDEN...
Realip
==================================================================================== Ensure that the nginx 'ngx_http_realip_module' is installed: nginx -V 2>&1 | grep --color -o 'http_realip_module' 2. Create a new file, for example /etc/nginx/cloudflar...
WP-CLI
==================================================================================== WP-CLI Installation guide ------------------------------------------------------------------------------------------------------------------------------------------------ D...
TOP
------------------------------------------------------------------------------------------------------------------------------------------------ Logging interval To change ATOP's logging interval edit the below file: vim /usr/share/atop/atop.daily In here,...
Permissions Restores
==================================================================================== Client chowned their server? did you chown a clients server? Never fear, facl is here. https://kb.ukfast.net/Linux_file_permissions ========================================...
FHS - Filesystem Hierarchy Standard
==================================================================================== FHS as defined by RedHat: ------------------------------------------------------------------------------------------------------------------------------------------------ /...
LVM (Logical Volume Manager)
==================================================================================== LVM, or Logical Volume Manager, is a tool used on Linux systems to manage disk space in a more flexible way compared to traditional partitioning. It acts like a layer of abst...
STORAGE CONCEPTS
==================================================================================== This page details the storage concepts for a linux system. ------------------------------------------------------------------------------------------------------------------...
Sandboxing & CHROOT
==================================================================================== CHROOT (Changed Root) Jail CHROOT essentially means that a user or application has it's root changed, essentially locking it away from the rest of the server filesystem. ...
VI/VIM
Line Numbers vim can display line numbers using the below command: :set number Skip to specific line number To skip to line 255: :255 ------------------------------------------------------------------------------------------------------------------------...
Find, Locate, and Grep
==================================================================================== FIND Find is a linux search tool that can be used to find a variety of files based on the given criteria. ------------------------------------------------------------------...
Archiving and Compression
==================================================================================== gzip ==================================================================================== tar (.tar) - Tape Archive Take multiple files and compress them into a single ...
PAM
Pluggable Authentication Modules (PAM) PAM is essentially an authentication system that allows for different modules to be added for support of different authentication methods, as an example; 2fa would be handled by PAM on a Linux system. /etc/security/ ==...
File Permissions & Ownership
==================================================================================== Linux File Permissions Every file in Linux has permissions, these define which actions can be undertaken by the user,group, and other. As seen on the file below, permission...