業務用エアコン関連の技術情報、エラーコード、環境問題対策に関する別サイト「エアコンの安全な修理・適切なフロン回収」

nuy

Debian12.5_en

Debian12.5 ; System Backup and Restore

1. System Backup1.1 Backup under /var/www/html① Create backup_all.sh script under /opt/script1.2 MariaDB database backup①Create db_backup.sh script under /opt/script# vi /opt/script/db_backup.shdb_backup.sh script contents2. System Restore2.1 Restore backup files under HTML① Store HTML backup files used for backup in the "/ (root)" directorySelect the backup file with the latest timestamp (e.g. www_back_20220501.tar.gz)2.2 Restore MariaDB database①Save DB backup file to any directory and extract data# cd /var/www/backup/db_bak
Debian12.1_en

Debian12 ; System Backup and Restore

1. System Backup1.1 Backup under /var/www/html① Create backup_all.sh script under /opt/script1.2 MariaDB database backup①Create db_backup.sh script under /opt/script# vi /opt/script/db_backup.shdb_backup.sh script contents2. System Restore2.1 Restore backup files under HTML① Store HTML backup files used for backup in the "/ (root)" directorySelect the backup file with the latest timestamp (e.g. www_back_20220501.tar.gz)2.2 Restore MariaDB database①Save DB backup file to any directory and extract data# cd /var/www/backup/db_bak
Debian12.1_en

Debian12 ;  Suricata , Logwatch , Chkrootkit , Disk Usage Check Script

SuricataSURICATA IDS/IPS is an open source IDS that monitors communications on the network and detects suspicious traffic.The basic mechanism is signature-based, so it can detect predefined unauthorized communications. Suricata is also characterized by its ability to provide protection as well as detection. Logwatch,Chkrootkit,Disk Usage Check Script install
Debian12.1_en

Debian12 ; Nagios Server , Tripwire Install

Open source integrated monitoring software "Nagios Server" installedNagios is an open source monitoring solution running on Linux.Nagios is designed to periodically check critical network, application, or server parameters.These parameters include microprocessor load, number of running processes, log files, disk and memory usage, as well as many other services such as SMTP (Simple Mail Transfer Protocol), HTTP (Hypertext Transfer Protocol), POP3 (Post Office Protocol 3), etc. can be checked.These parameters require a microprocessor load, a database such as PHP or MySQL to run Nagois, and a web server such as Apache or Nginx. We will proceed under the assumption that all of these have already been configured
Debian12.1_en

Debian12 ; MariaDB , WordPress Install

1. MariaDB1.1 Install1.4. MariaDB Server Security SettingsMariaDB comes with a default security script, mariadb-secure-installation, which can be used to improve the security of your MariaDB installation, includingSet a password for the root account (if necessary).Disable remote root login to the database.Delete anonymous user accounts.Delete the test database to which anonymous users have access by default.2.WordPress2.1 Database CreationCreate a database for Word Press (for example, in this case, the database name is "wp_db", the user name is "wp_user", and the password is "?Y123456y")
Debian12.1_en

Debian12 ; WEB Server(Apache) Install

Web server Apache2 installationAllow http:80 and https:443 ports in UFW before installation3.  Apache2; Using Perl ScriptsEnable CGI to make Perl scripts available①Install Perl4 Apache2 : Using PHP Scripts①Install PHP5. Virtual Host SettingsCopy the default configuration file (file name is arbitrary, in this case vhost-yourdomain.conf as an example) and configure the virtual host6. Digest authentication with Apache2Since Basic Authentication, a well-known authentication authorization method for http, sends authentication information in plain text, there is a risk of ID and password leakage if the packet is intercepted.On the other hand, Digest Authentication encrypts and transmits authentication information, so there is almost no risk of information leakage.
Debian12.5_en

Debian12.5 ; NTP ,FTP Server Installation

1. Install a time synchronization service NTP server# apt -y install chrony# vi /etc/chrony/chrony.conf# Lines 20-23.:Comment the default settings and add the NTP server for your time zone.#pool ntp.ubuntu.com     iburst maxsources 4#pool 0.ubuntu.pool.ntp.org iburst maxsources 1#pool 1.ubuntu.pool.ntp.org iburst maxsources 1#pool 2.ubuntu.pool.ntp.org iburst maxsources 2
AlmaLinux8.8_en

AlmaLinux8.8 ; SSH connection using public key cryptography

Create a key pairCreate a public/private key pair for a user connecting to a Linux server using OpenSSH.Use ssh-keygen to create the key pair.The creation of a public/private key pair must be done as a user with remote login privileges.If you do not specify the destination and file name, id_ed25519 and id_ed25519.pub will be created in /home/(user name)/.ssh/. On the way, enter the password for the key.
Ubuntu20.04_en

Ubuntu Server 20.04 Initial setup

1. Set the root password and use the SU commandIn the default Ubuntu configuration, the root user is disabled because no password is set.By setting a password for the root user, the traditional [su] command can be used for transitions$ sudo passwd root[sudo] password for ← Current user's passwordEnter new UNIX password: ← Enter the root user password to be setRetype new UNIX password: ← Enter your password againpasswd: password updated successfullySwitch to root user$ su -Password:2. Modernisation of the system
Ubuntu22.04_en

Ubuntu Server 22.04 : Initialization

1. Set root password and use SU commandThe root user is unavailable in the default Ubuntu configuration because no password is set.Setting a password for the root user allows transitions using the conventional [su] command.$ sudo passwd root[sudo] password for ← Current user's passwordEnter new UNIX password: ← Enter the root user password to be setRetype new UNIX password: ← Re-entry force
Ubuntu22.04_en

Ubuntu Server 22.04 : WEB Server(Apache)

Apache2 installation.Allow http:80 port and https:443 port in UFW first.# ufw allow http# ufw allow https# ufw reload1 Install Apache2# apt -y install apache22 Apache2 Basic Settings
AlmaLinux8.8_en

AlmaLinux8.8 ; Snort3+Snortsnarf , Chkrootkit Install

Snort3+Snortsnarf InstallImplement Snort, a network-based IDS, in the unauthorized access detection system.SnortSnarf will also be installed to enable the unauthorized access logs extracted by Snort to be checked on a Web browser.AlmaLinux8 does not have a Snort3 repository, so build, compile and install Snort3 from source codeAdvance preparation①Install required build tools and librariesInstall the EPEL repository and enable the Powertools repository.chkrootkit①Download and install chkrootkit# cd /usr/local/src# wget ftp://ftp.chkrootkit.org/pub/seg/pac/chkrootkit.tar.gz# tar xvf chkrootkit.tar.gz➁Create /root/bin directory and move chkrootkit command to that directory# mkdir -p /root/bin# mv chkrootkit-0.58b/chkrootkit /root/bin➂Check chkrootkit.
Rocly Linux8.8_en

RockyLinux8.8 ; Snort3+Snortsnarf , Chkrootkit Install

Snort3+Snortsnarf InstallImplement Snort, a network-based IDS, in the unauthorized access detection system.SnortSnarf will also be installed to enable the unauthorized access logs extracted by Snort to be checked on a Web browser.RockyLinux8 does not have a Snort3 repository, so build, compile and install Snort3 from source codeAdvance preparation①Install required build tools and librariesInstall the EPEL repository and enable the Powertools repository.chkrootkit①Download and install chkrootkit# cd /usr/local/src# wget ftp://ftp.chkrootkit.org/pub/seg/pac/chkrootkit.tar.gz# tar xvf chkrootkit.tar.gz➁Create /root/bin directory and move chkrootkit command to that directory# mkdir -p /root/bin# mv chkrootkit-0.58b/chkrootkit /root/bin➂Check chkrootkit.
CentOS9_en

CentOS Stream9 ; Initial settings after installation

1.Disabling SELinuxFirst, disable selinux. selinux is a feat...
OracleLinux9.1-en

OracleLinux9.1 : Initial settings after OS installation

1.Install bash completion extension package# dnf -y install bash-completion# reboot2.Disabling SELinuxFirst, disable selinux. selinux is a feature that improves auditing and security in Linux, but when enabled, it can limit the behavior of services and the contents of the configuration considerably.Therefore, it is basically a case of invalidation in many cases.SELinux operating modesEnforcing : SELinux functionality is enabled and access control is enabledPermissive : SElinux will warn, but no access restrictions will be placeddisabled : Both SElinux function and access control are disabled