SSH tunneling – for SOCK proxy port forwarding

SSH tunneling – for SOCK proxy port forwarding

Introduction – SSH (secure shell) client can be used as “SSH tunneling for SOCK proxy port forwarding“. ssh -D [bind_address:]port * -D option in SSH can be used to specifies a local “dynamic” application-level port forwarding. This works by allocating a socket to listen to port on the local side, optionally bound to the specified …

Read More Read More

Automation using Macro tools

Automation using Macro tools

Introduction – Automation means making the manual work fully automatic. Any (repeating) manual work on computer applications can be automated using some software. Now I am going to explain the usage of macro tools to perform automation…. I found many automation tools are available to write the automation scripts and run to perform the repeated …

Read More Read More

Different methods of accessing subversion (svn) repository

Different methods of accessing subversion (svn) repository

Introduction – There are three different methods of accessing subversion repository… 1] Local filesystem or Network filesystem accessed by client directly 2] Apache HTTP using WebDAV module 3] svnserve tunneled over an SSH (svn + ssh) First of all I am creating base directory for svn as “/var/repos_base” root@arun:~# mkdir /var/repos_base root@arun:~# ls -ld  /var/repos_base …

Read More Read More

How to remove all blank lines from file – grep command

How to remove all blank lines from file – grep command

1] cat the file arun.txt which has several blank lines root@indianGNU.org:/home# cat arun.txt This is first line of file this is second line ok this script will help you to delete all blank links from file How to start shell scripting make sure that you will win arun bagul end of file root@indianGNU.org:/home# 2] Run …

Read More Read More

Pluggable Authentication Modules (PAM)

Pluggable Authentication Modules (PAM)

Programs which give privileges to users must properly authenticate each user. For instance, when you log into a system, you provide your username and password, and the log in process uses this username and password to verify your identity. Pluggable Authentication Modules (PAM) allows the system administrator to set authentication policies for PAM-aware applications without …

Read More Read More

History of UNIX

History of UNIX

In mid-1960, When American Telephone and Telegraph ( AT&T), Honeywell, General Electrical (GE) and Massachusetts Institute of Technology (MIT) embarked on massive project to delevelop an information utility. The project call MULTICS ( MULtiplexed Information and Computer Services) which was funded by DARPA ( DoD Advanced Research Project Agency). In 1969 the MIT and AT&T …

Read More Read More

sudo -configuration

sudo -configuration

1] Introduction: root is super user with unrestricted access to all system resources and files in Linux OS. The uid and gid of root user is 0 (zero). But many time the system/Linux admin wants to give some restricted access to some user or groups of user. In such case the sudo is the best …

Read More Read More