Category Archives: Linux - Page 7

How To Reset Root User Password In CentOS/RHEL 7

How To Reset Root Password In Linux CentOS/RHEL 7

Normally resetting the root password is a simple task if you’re logged in already with root privileges, however if you forget the password and need to change it things become a little more difficult.

The process has changed from CentOS/RHEL (Red Hat Enterprise Linux) version 6 to 7, as previously you would boot into single user mode and then change the password as root. From version 7 the equivalent modes are the rescue or emergency targets, however these require the root password before you can do anything which doesn’t help us here, so we’ll take you through the new process to change the lost root password.

This is also a task that you will need to know how to perform for the RHCSA exam.

Read more »

How To Install PowerShell On Linux

How To Install PowerShell On Linux

Earlier this month Microsoft announced that PowerShell had been open sourced and would be available for use in Linux. As a result of this, PowerShell is now available for Ubuntu 14.04 and 16.04, CentOS/RHEL 7, and macOS 10.11.

If your first thought is along the lines of “who would use this abomination?”, then you’re in good company. My best thought at who this is targeted towards is the Windows system administrator that needs to be able to manage Linux systems as they are likely already quite familiar with PowerShell and perhaps unwilling to change.

Personally I’d look at using a tool such as Puppet for managing systems running various operating systems, however here’s how you can install PowerShell in Linux should you want to take this path.

Read more »

How To Add A Nessus Scanner To SecurityCenter Using Certificates

Add Nessus Scanner To Tenable SecurityCenter

This guide will show you how to add a Nessus scanner into Tenable’s SecurityCenter using certificate based authentication, rather than standard username and password authentication.

Read more »

How To Migrate Tenable SecurityCenter

Migrating Tenable SecurityCenter

Here we’re going to cover how to migrate an existing running instance of Tenable SecurityCenter from one Linux server to another.

I was not able to find great documentation around this process, and after contacting Tenable support for instructions I found that the steps provided were very basic and did not actually include everything needed, so I have documented everything that I needed to do here.

Read more »

Linux How To: Delete A User Account

Linux How To: Delete User Account

In Linux we can delete local user accounts with the ‘userdel’ command. Here we will cover some examples of using the various syntax options with userdel in order to remove a local user account in Linux.

Read more »

Linux How To: Copy a File or Directory

Copy File Or Directory In Linux

In Linux we can copy files and directories around with the ‘cp’ command. Here we will demonstrate some common examples in which ‘cp’ can be used.

Read more »

Linux How To: Join Two Files – Append One File To Another

Linux How To: Join Files

With the Bash shell in Linux it is quite simple to append the contents of one file to another, here we will cover how to perform file concatenation.

Read more »

Linux How To: Add User To Group

Linux How To: Add User To Group

In Linux we can modify a local user account with the ‘usermod’ command. Here we will cover some examples of using the various syntax options with usermod in order to modify existing user accounts in Linux, specifically to add them into a group.

Read more »

Linux How To: Add A User Account

Linux How To: Create New User Account

In Linux we can create a new user account with the ‘useradd’ command. Here we will cover some examples of using the various syntax options with useradd in order to create a new local user account in Linux.

Read more »

How To Use Kerberos to Control Access to NFS Network Shares

Secure NFS with Kerberos

By default NFS is not very secure, there’s no real authentication and access is granted based on hostname or IP address, information is sent over the network in plain text, and it’s also fairly easy to fake your UID/GID.

By making use of Kerberos we can secure NFS as this provides authentication, encryption and integrity.

Read more »