Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

160 total results found

FTP Troubleshooting

File Transfers, Synchronisation & Share...

==================================================================================== FTP Passive Mode Passive ports are used to allow multiple FTP connections  by moving open FTP connections from port 21 to a port specified in the passive port range (40,000-...

Nick Abbots Script

Monitoring

Nick Abbots Script: vi ukfastmon;chmod u+x ukfastmon; ./ukfastmon; rm -f ukfastmon #!/bin/bash if [ "$1" = "w" ]; then locate wp-includes/version.php | xargs grep -H '^$wp_version' | grep -v virtfs echo "" echo "" echo -n "The latest stable rele...

One-liners

Monitoring

==================================================================================== Common Error/Limit identification  ------------------------------------------------------------------------------------------------------------------------------------------...

MySQL Optimisation, Performance, and Logging

Server Software MySQL

==================================================================================== MySQL Optimisation ==================================================================================== MySQL Tuner Script wget -O mysqltuner.pl mysqltuner.pl && perl mysq...

Corruption and Repairs

Server Software MySQL

==================================================================================== MySQL Check mysqlcheck -options database MySQL Check Options: -c Checks tables for errors. It performs a CHECK TABLE operation on each table in the specified databa...

SSL Certificates

CloudFlare

Origin IP

CloudFlare

Bots/Crawlers & Control/Mitigation

Monitoring

==================================================================================== Robots.txt   Robots.txt is a file that can be used on a server to decide which bots/crawlers can access the site as well as how often they can make requests.  It's important...

SPF, DMARC, and DKIM

Mail

SPF (Sender Policy Framework) is an email authentication record, which is essentially used to define which specific servers are permitted to send mail on behalf of a domain. https://docs.ukfast.co.uk/email/spf.html -------------------------------------------...

Plesk Mail

Mail

------------------------------------------------------------------------------------------------------------------------------------------   Mail Account Credentials We can run the below command to retrieve credentials for any mail account on a Plesk server:...

User & Group Management

User Management & File Permissions

Adding Users Adding Users To add a user, the useradd command can be used. useradd username If you want to create a user with it's own home directory, this can be done using the -m flag: useradd -m username The default contents of a users home directo...

User/Group/Password Files

User Management & File Permissions

==================================================================================== /etc/passwd used to store user and system accounts ==================================================================================== /etc/shadow Used to store user pas...

Admin Privileges - Sudoers

User Management & File Permissions

User & Group Privileges For users to have escalated privilege on a server (root access), they need to be granted this permission. sudo Users with sudo access have full administrator permissions, which means that they can essentially perform any task on th...

Linux+
Linux +

Package Managers

Software & Service Management

==================================================================================== YUM (Yellowdog Update Manager) & DNF Both yum and DNF are found on RedHat based systems, and are pretty much interchangable. -----------------------------------------------...

Compiling from source

Software & Service Management

Compiling an application from source essentially means that you are manually creating a package using the source code. In this example, I'm compiling the John the Ripper password cracker from source, on an Ubuntu machine. To being, ensure that the required p...

Networking Commands

System Networking

==================================================================================== Show networking information show current networking configuration and status ip a Show IPv4 or IPv6 specifically ip -4 a ip -6 a Show IPs assigned to interfaces in si...

Network Managers

System Networking

==================================================================================== Ubuntu - Netplan Before making changes to the network configuration on an Ubuntu machine, ensure that Cloud-init isn't enabled. Cloud-init is essentially Canonicals attempt ...

DNS and Hosts Resolution

System Networking

==================================================================================== DNS and Hosts Testing ------------------------------------------------------------------------------------------------------------------------------------------------ dig d...

GRUB - Grand Unified Boot Loader

Boot, Kernel, Recovery, and Tunables

GRUB's responsibility in the boot process   GRUB2 Installation There may come a time where you need to install or reinstall GRUB2 on a system. Depending on whether your system is booting via BIOS or UEFI, you'll need to use a slightly different method; ...

Linux Kernel Overview

Boot, Kernel, Recovery, and Tunables

What is the Linux Kernel? The Linux kernel is the core software that acts as an interface between the hardware and various software applications running on your system. uname uname command can be used to view kernel and system information. uname -flag ...